dc.contributor.author |
Karyotis, V |
en |
dc.contributor.author |
Kakalis, A |
en |
dc.contributor.author |
Papavassiliou, S |
en |
dc.date.accessioned |
2014-03-01T02:46:17Z |
|
dc.date.available |
2014-03-01T02:46:17Z |
|
dc.date.issued |
2009 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/32635 |
|
dc.subject |
Closed queuing networks |
en |
dc.subject |
Malware spreading |
en |
dc.subject |
Topology control attacks |
en |
dc.subject.other |
Ad hoc and sensor networks |
en |
dc.subject.other |
Closed queuing networks |
en |
dc.subject.other |
Idle energy |
en |
dc.subject.other |
MAC layer |
en |
dc.subject.other |
Malicious software |
en |
dc.subject.other |
Malware spreading |
en |
dc.subject.other |
Malwares |
en |
dc.subject.other |
Network density |
en |
dc.subject.other |
Node degree |
en |
dc.subject.other |
Probabilistic framework |
en |
dc.subject.other |
Sleeping schedule |
en |
dc.subject.other |
Time-dependent |
en |
dc.subject.other |
Topology control |
en |
dc.subject.other |
Topology control attacks |
en |
dc.subject.other |
Wireless nodes |
en |
dc.subject.other |
Ad hoc networks |
en |
dc.subject.other |
Communication channels (information theory) |
en |
dc.subject.other |
Computer crime |
en |
dc.subject.other |
Energy conservation |
en |
dc.subject.other |
Network layers |
en |
dc.subject.other |
Queueing networks |
en |
dc.subject.other |
Topology |
en |
dc.subject.other |
Sensor networks |
en |
dc.title |
On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/SECURWARE.2009.46 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/SECURWARE.2009.46 |
en |
heal.identifier.secondary |
5211008 |
en |
heal.publicationDate |
2009 |
en |
heal.abstract |
Significant interest has been raised recently in wireless networks in modeling and dealing effectively with different types of attacks. In this paper, emphasis is placed on the attacker's perspective and based on a probabilistic framework we study intelligent strategies for spreading malicious software, in order to realize the potentials of such attacks. The considered attack schemes are based on the topology control capabilities of wireless nodes and may be realized either at the Network layer by using node degree related information or the MAC layer by setting attackers to sleep for energy conservation purposes. To the best of our knowledge this is the first attempt to adopt the use of sleeping schedules in order to eventually increase attack efficiency. We compare the performance of the two families of strategies using both time-independent and time-dependent attack metrics. Our evaluation analysis reveals an inherent tradeoff between the two families that depends, among others, on the idle energy consumption and the network density. © 2009 IEEE. |
en |
heal.journalName |
Proceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 |
en |
dc.identifier.doi |
10.1109/SECURWARE.2009.46 |
en |
dc.identifier.spage |
255 |
en |
dc.identifier.epage |
261 |
en |