2008
DOI: 10.1007/s11390-008-9141-z
|View full text |Cite
|
Sign up to set email alerts
|

Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis

Abstract: In this paper, the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from either an attacker or their already infected neighbors, is analyzed. Considering the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, on the basis of the theory of closed queuing networks, that aims at describing the aggregated behavior of the system when attacked by malicious nodes. Because of its nature, the mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 12 publications
0
13
0
1
Order By: Relevance
“…Virus spreading models [10][11][12] and control strategies in mobile environments attract much attention. So far, many efforts have been recently made to model virus spreading among computer network.…”
Section: Related Workmentioning
confidence: 99%
“…Virus spreading models [10][11][12] and control strategies in mobile environments attract much attention. So far, many efforts have been recently made to model virus spreading among computer network.…”
Section: Related Workmentioning
confidence: 99%
“…The security issue regarding malware propagation that exploits geographic proximity of wireless-enabled devices has received significant attention in recent years. Many efforts have been made to model the propagation behavior of malware in wireless networks, such as wireless sensor networks [70]- [73] and wireless ad-hoc networks [74]- [78].…”
Section: Comparison Of Epidemic Modelsmentioning
confidence: 99%
“…For example, V. Karyotis et-el [18] have study the propagation of malware over a wireless ad hoc network. They proposed a probabilistic model that is able to model and capture the aggregated behavior of a large ad hoc network attacked by a malicious node, where legitimate network nodes are prone to propagate infections they receive to their neighbors.…”
Section: B Infrastructure-based Detection Typologymentioning
confidence: 99%