HEAL DSpace

On the asymptotic behavior of malware-propagative mobile ad hoc networks

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Karyotis, V en
dc.contributor.author Grammatikou, M en
dc.contributor.author Papavassiliou, S en
dc.date.accessioned 2014-03-01T02:44:52Z
dc.date.available 2014-03-01T02:44:52Z
dc.date.issued 2007 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/31985
dc.subject Ad Hoc Network en
dc.subject Closed Queueing Network en
dc.subject Critical Parameter en
dc.subject Mobile Ad Hoc Network en
dc.subject Probabilistic Model en
dc.subject Steady State en
dc.subject Susceptible Infected Susceptible en
dc.subject.other Asymptotic analysis en
dc.subject.other Computer crime en
dc.subject.other Probability en
dc.subject.other Queueing networks en
dc.subject.other Queueing theory en
dc.subject.other Sensors en
dc.subject.other Stochastic models en
dc.subject.other Switching circuits en
dc.subject.other Telecommunication networks en
dc.subject.other Wireless networks en
dc.subject.other Wireless telecommunication systems en
dc.subject.other Ad-hoc networking en
dc.subject.other Analytical results en
dc.subject.other Asymptotic behaviors en
dc.subject.other Closed queueing networks en
dc.subject.other Critical parameters en
dc.subject.other Malicious nodes en
dc.subject.other Malicious software en
dc.subject.other Malware en
dc.subject.other Mobile Ad-Hoc Networks en
dc.subject.other Number of nodes en
dc.subject.other Probabilistic model en
dc.subject.other Sensor systems en
dc.subject.other Steady-state behaviors en
dc.subject.other Stochastic behavior en
dc.subject.other Susceptible-infected-susceptible en
dc.subject.other Wireless environments en
dc.subject.other Ad hoc networks en
dc.title On the asymptotic behavior of malware-propagative mobile ad hoc networks en
heal.type conferenceItem en
heal.identifier.primary 10.1109/MOBHOC.2007.4428662 en
heal.identifier.secondary http://dx.doi.org/10.1109/MOBHOC.2007.4428662 en
heal.identifier.secondary 4428662 en
heal.publicationDate 2007 en
heal.abstract In this paper we study the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from an attacker or their already infected neighbors. Considering the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, based on the theory of closed queueing networks, that aims at describing the aggregated behavior of the system when attacked by a malicious node. Due to its nature the model is able to deal more effectively with the stochastic behavior of the attacker and the inherent probabilistic nature of the wireless environment. The proposed model is able to describe accurately the asymptotic behavior of malware-propagative ad hoc networking environments, where the number of nodes is large. Using the Norton equivalent of the closed queueing network, we obtain analytical results for its steady state behavior, which in turn can be used to identify the critical parameters affecting the operation of the network. ©2007 IEEE. en
heal.journalName 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, MASS en
dc.identifier.doi 10.1109/MOBHOC.2007.4428662 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής