dc.contributor.author |
Karyotis, V |
en |
dc.contributor.author |
Papavassiliou, S |
en |
dc.date.accessioned |
2014-03-01T02:44:52Z |
|
dc.date.available |
2014-03-01T02:44:52Z |
|
dc.date.issued |
2007 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/31989 |
|
dc.subject |
Ad hoc networks |
en |
dc.subject |
Attack strategies |
en |
dc.subject |
Malware spreading |
en |
dc.subject.other |
Computer crime |
en |
dc.subject.other |
Optimization |
en |
dc.subject.other |
Parameter estimation |
en |
dc.subject.other |
Queueing networks |
en |
dc.subject.other |
Attack strategies |
en |
dc.subject.other |
Malware spreading |
en |
dc.subject.other |
Ad hoc networks |
en |
dc.title |
On the malware spreading over non-propagative wireless ad hoc networks: The attacker's perspective |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1145/1298239.1298268 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1145/1298239.1298268 |
en |
heal.publicationDate |
2007 |
en |
heal.abstract |
In this paper, we adopt a probabilistic framework for malware spreading and propose a closed queueing network model that is able to describe analytically the aggregated behavior of an ad hoc network attacked by multiple malicious nodes, In our framework, the attackers are assumed to be capable of initially adapting their transmission radii and thus employing different attack strategies, We take on the attacker's perspective and formulate various optimization problems with respect to the development of different attack strategies, that address the attackers' objective to harm the network and identify the system parameters that can be exploited to achieve this purpose more effectively. Copyright 2007 ACM. |
en |
heal.journalName |
Q2SWinet'07: Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks |
en |
dc.identifier.doi |
10.1145/1298239.1298268 |
en |
dc.identifier.spage |
156 |
en |
dc.identifier.epage |
159 |
en |