2007
Karyotis, V.; Papavassiliou, S.
On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective Conference
Chania, Crete Island, 2007, ISBN: 9781595938060, (cited By 4; Conference of Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks ; Conference Date: 22 October 2007 Through 22 October 2007; Conference Code:71773).
Abstract | Links | BibTeX | Tags: Ad hoc networks, Attack strategies; Malware spreading, Computer crime; Optimization; Parameter estimation; Queueing networks
@conference{Karyotis2007156,
title = {On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective},
author = {V. Karyotis and S. Papavassiliou},
url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-42149094983&doi=10.1145%2f1298239.1298268&partnerID=40&md5=d22b4d7ed501e1c1818bf98805ea6ba6},
doi = {10.1145/1298239.1298268},
isbn = {9781595938060},
year = {2007},
date = {2007-01-01},
journal = {Q2SWinet'07: Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks},
pages = {156-159},
address = {Chania, Crete Island},
abstract = {In this paper, we adopt a probabilistic framework for malware spreading and propose a closed queueing network model that is able to describe analytically the aggregated behavior of an ad hoc network attacked by multiple malicious nodes, In our framework, the attackers are assumed to be capable of initially adapting their transmission radii and thus employing different attack strategies, We take on the attacker's perspective and formulate various optimization problems with respect to the development of different attack strategies, that address the attackers' objective to harm the network and identify the system parameters that can be exploited to achieve this purpose more effectively. Copyright 2007 ACM.},
note = {cited By 4; Conference of Q2SWinet'07: 3rd ACM Workshop on Q2S and Security for Wireless and Mobile Networks ; Conference Date: 22 October 2007 Through 22 October 2007; Conference Code:71773},
keywords = {Ad hoc networks, Attack strategies; Malware spreading, Computer crime; Optimization; Parameter estimation; Queueing networks},
pubstate = {published},
tppubtype = {conference}
}
In this paper, we adopt a probabilistic framework for malware spreading and propose a closed queueing network model that is able to describe analytically the aggregated behavior of an ad hoc network attacked by multiple malicious nodes, In our framework, the attackers are assumed to be capable of initially adapting their transmission radii and thus employing different attack strategies, We take on the attacker's perspective and formulate various optimization problems with respect to the development of different attack strategies, that address the attackers' objective to harm the network and identify the system parameters that can be exploited to achieve this purpose more effectively. Copyright 2007 ACM.