HEAL DSpace

On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Karyotis, V en
dc.contributor.author Kakalis, A en
dc.contributor.author Papavassiliou, S en
dc.date.accessioned 2014-03-01T02:46:17Z
dc.date.available 2014-03-01T02:46:17Z
dc.date.issued 2009 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/32635
dc.subject Closed queuing networks en
dc.subject Malware spreading en
dc.subject Topology control attacks en
dc.subject.other Ad hoc and sensor networks en
dc.subject.other Closed queuing networks en
dc.subject.other Idle energy en
dc.subject.other MAC layer en
dc.subject.other Malicious software en
dc.subject.other Malware spreading en
dc.subject.other Malwares en
dc.subject.other Network density en
dc.subject.other Node degree en
dc.subject.other Probabilistic framework en
dc.subject.other Sleeping schedule en
dc.subject.other Time-dependent en
dc.subject.other Topology control en
dc.subject.other Topology control attacks en
dc.subject.other Wireless nodes en
dc.subject.other Ad hoc networks en
dc.subject.other Communication channels (information theory) en
dc.subject.other Computer crime en
dc.subject.other Energy conservation en
dc.subject.other Network layers en
dc.subject.other Queueing networks en
dc.subject.other Topology en
dc.subject.other Sensor networks en
dc.title On the tradeoff between MAC-layer and network-layer topology-controlled malware spreading schemes in ad hoc and sensor networks en
heal.type conferenceItem en
heal.identifier.primary 10.1109/SECURWARE.2009.46 en
heal.identifier.secondary http://dx.doi.org/10.1109/SECURWARE.2009.46 en
heal.identifier.secondary 5211008 en
heal.publicationDate 2009 en
heal.abstract Significant interest has been raised recently in wireless networks in modeling and dealing effectively with different types of attacks. In this paper, emphasis is placed on the attacker's perspective and based on a probabilistic framework we study intelligent strategies for spreading malicious software, in order to realize the potentials of such attacks. The considered attack schemes are based on the topology control capabilities of wireless nodes and may be realized either at the Network layer by using node degree related information or the MAC layer by setting attackers to sleep for energy conservation purposes. To the best of our knowledge this is the first attempt to adopt the use of sleeping schedules in order to eventually increase attack efficiency. We compare the performance of the two families of strategies using both time-independent and time-dependent attack metrics. Our evaluation analysis reveals an inherent tradeoff between the two families that depends, among others, on the idle energy consumption and the network density. © 2009 IEEE. en
heal.journalName Proceedings - 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009 en
dc.identifier.doi 10.1109/SECURWARE.2009.46 en
dc.identifier.spage 255 en
dc.identifier.epage 261 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής