HEAL DSpace

Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Karyotis, V en
dc.contributor.author Papavassiliou, S en
dc.date.accessioned 2014-03-01T01:27:04Z
dc.date.available 2014-03-01T01:27:04Z
dc.date.issued 2007 en
dc.identifier.issn 1389-1286 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/18329
dc.subject Attack modeling en
dc.subject Mobile ad hoc networks en
dc.subject QoS en
dc.subject Security en
dc.subject Topology control en
dc.subject.classification Computer Science, Hardware & Architecture en
dc.subject.classification Computer Science, Information Systems en
dc.subject.classification Engineering, Electrical & Electronic en
dc.subject.classification Telecommunications en
dc.subject.other Algorithms en
dc.subject.other Computer simulation en
dc.subject.other Probabilistic logics en
dc.subject.other Quality of service en
dc.subject.other Security of data en
dc.subject.other Topology en
dc.subject.other Attack modeling en
dc.subject.other Probabilistic attack modeling en
dc.subject.other Topology control en
dc.subject.other Ad hoc networks en
dc.title Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework en
heal.type journalArticle en
heal.identifier.primary 10.1016/j.comnet.2007.01.028 en
heal.identifier.secondary http://dx.doi.org/10.1016/j.comnet.2007.01.028 en
heal.language English en
heal.publicationDate 2007 en
heal.abstract In this paper, we introduce and design a modeling framework that allows for the study and analysis of attack propagation in mobile ad hoc networks. The choice of a statistical approach for the problem is motivated by the dynamic characteristics of the ad hoc topology and the stochastic nature of threat propagation. Based on this probabilistic modeling framework, we study the impact of topology and mobility in the propagation of software threats over ad hoc networks. We design topology control algorithms that indicate how to properly adjust an attacker's transmission radius, according to the measured topological characteristics and availability of its resources, in the process of infecting a network more effectively. Then based on these topology control algorithms we develop different attack strategies that may range from independent attacks to cooperative scenarios in order to increase the negative impact of an attack on the network. Our performance evaluation results demonstrate that the proposed topology control algorithms and respective attack strategies effectively balance the tradeoffs between the potential network damage and the attackers' lifetime, and as a result significantly outperform any other flat and threshold-based approaches. (C) 2007 Elsevier B.V. All rights reserved. en
heal.publisher ELSEVIER SCIENCE BV en
heal.journalName Computer Networks en
dc.identifier.doi 10.1016/j.comnet.2007.01.028 en
dc.identifier.isi ISI:000246834300017 en
dc.identifier.volume 51 en
dc.identifier.issue 9 en
dc.identifier.spage 2397 en
dc.identifier.epage 2410 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής