dc.contributor.author |
Karyotis, V |
en |
dc.contributor.author |
Grammatikou, M |
en |
dc.contributor.author |
Papavassiliou, S |
en |
dc.date.accessioned |
2014-03-01T02:44:52Z |
|
dc.date.available |
2014-03-01T02:44:52Z |
|
dc.date.issued |
2007 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/31985 |
|
dc.subject |
Ad Hoc Network |
en |
dc.subject |
Closed Queueing Network |
en |
dc.subject |
Critical Parameter |
en |
dc.subject |
Mobile Ad Hoc Network |
en |
dc.subject |
Probabilistic Model |
en |
dc.subject |
Steady State |
en |
dc.subject |
Susceptible Infected Susceptible |
en |
dc.subject.other |
Asymptotic analysis |
en |
dc.subject.other |
Computer crime |
en |
dc.subject.other |
Probability |
en |
dc.subject.other |
Queueing networks |
en |
dc.subject.other |
Queueing theory |
en |
dc.subject.other |
Sensors |
en |
dc.subject.other |
Stochastic models |
en |
dc.subject.other |
Switching circuits |
en |
dc.subject.other |
Telecommunication networks |
en |
dc.subject.other |
Wireless networks |
en |
dc.subject.other |
Wireless telecommunication systems |
en |
dc.subject.other |
Ad-hoc networking |
en |
dc.subject.other |
Analytical results |
en |
dc.subject.other |
Asymptotic behaviors |
en |
dc.subject.other |
Closed queueing networks |
en |
dc.subject.other |
Critical parameters |
en |
dc.subject.other |
Malicious nodes |
en |
dc.subject.other |
Malicious software |
en |
dc.subject.other |
Malware |
en |
dc.subject.other |
Mobile Ad-Hoc Networks |
en |
dc.subject.other |
Number of nodes |
en |
dc.subject.other |
Probabilistic model |
en |
dc.subject.other |
Sensor systems |
en |
dc.subject.other |
Steady-state behaviors |
en |
dc.subject.other |
Stochastic behavior |
en |
dc.subject.other |
Susceptible-infected-susceptible |
en |
dc.subject.other |
Wireless environments |
en |
dc.subject.other |
Ad hoc networks |
en |
dc.title |
On the asymptotic behavior of malware-propagative mobile ad hoc networks |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/MOBHOC.2007.4428662 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/MOBHOC.2007.4428662 |
en |
heal.identifier.secondary |
4428662 |
en |
heal.publicationDate |
2007 |
en |
heal.abstract |
In this paper we study the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from an attacker or their already infected neighbors. Considering the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, based on the theory of closed queueing networks, that aims at describing the aggregated behavior of the system when attacked by a malicious node. Due to its nature the model is able to deal more effectively with the stochastic behavior of the attacker and the inherent probabilistic nature of the wireless environment. The proposed model is able to describe accurately the asymptotic behavior of malware-propagative ad hoc networking environments, where the number of nodes is large. Using the Norton equivalent of the closed queueing network, we obtain analytical results for its steady state behavior, which in turn can be used to identify the critical parameters affecting the operation of the network. ©2007 IEEE. |
en |
heal.journalName |
2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS |
en |
dc.identifier.doi |
10.1109/MOBHOC.2007.4428662 |
en |