HEAL DSpace

Malware-propagative mobile ad hoc networks: Asymptotic behavior analysis

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Karyotis, V en
dc.contributor.author Kakalis, A en
dc.contributor.author Papavassiliou, S en
dc.date.accessioned 2014-03-01T01:28:44Z
dc.date.available 2014-03-01T01:28:44Z
dc.date.issued 2008 en
dc.identifier.issn 1000-9000 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/18945
dc.subject Closed queuing networks en
dc.subject Infection efficiency en
dc.subject Wireless ad hoc networks en
dc.subject.classification Computer Science, Hardware & Architecture en
dc.subject.classification Computer Science, Software Engineering en
dc.subject.other Closed queuing networks en
dc.subject.other Infection efficiency en
dc.subject.other Multiple attackers en
dc.subject.other Computer software en
dc.subject.other Mathematical models en
dc.subject.other Parameter estimation en
dc.subject.other Queueing networks en
dc.subject.other Ad hoc networks en
dc.title Malware-propagative mobile ad hoc networks: Asymptotic behavior analysis en
heal.type journalArticle en
heal.identifier.primary 10.1007/s11390-008-9141-z en
heal.identifier.secondary http://dx.doi.org/10.1007/s11390-008-9141-z en
heal.language English en
heal.publicationDate 2008 en
heal.abstract In this paper, the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from either an attacker or their already infected neighbors, is analyzed. Considering the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, on the basis of the theory of closed queuing networks, that aims at describing the aggregated behavior of the system when attacked by malicious nodes. Because of its nature, the model is also able to deal more effectively with the stochastic behavior of attackers and the inherent probabilistic nature of the wireless environment. The proposed model is able to describe accurately the asymptotic behavior of malware-propagative large scale ad hoc networking environments. Using the Norton equivalent of the closed queuing network, we obtain analytical results for its steady state behavior, which in turn is used for identifying the critical parameters affecting the operation of the network. Finally, through modeling and simulation, some additional numerical results are obtained with respect to the behavior of the system when multiple attackers are present, and regarding the time-dependent evolution and impact of an attack. © 2008 Science Press, Beijing, China and Springer Science + Business Media, LLC, USA. en
heal.publisher SCIENCE CHINA PRESS en
heal.journalName Journal of Computer Science and Technology en
dc.identifier.doi 10.1007/s11390-008-9141-z en
dc.identifier.isi ISI:000255955800008 en
dc.identifier.volume 23 en
dc.identifier.issue 3 en
dc.identifier.spage 389 en
dc.identifier.epage 399 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής