2012
DOI: 10.1109/tnet.2012.2183642
|View full text |Cite
|
Sign up to set email alerts
|

Maximum Damage Malware Attack in Mobile Wireless Networks

Abstract: Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this security threat, we seek to quantify the maximum damage inflicted on the system owing to such outbreaks and identify the most vicious attacks. We represent the propagation of malware in a battery-constrained mobile wireless network by an epidemic model in which the worm can dynamically control the rate at which it kills the infected node a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
34
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(34 citation statements)
references
References 26 publications
0
34
0
Order By: Relevance
“…Under the finite state framework, we have proved equation (3) converges to equation (4). The solutions of equation (1) discuss the limit of equation (3), and for a general environment, the differential equation (3) weakly converges to the solution of equation (1) Moreover, we can analyze the evolution of each individual behavior of participants using the Markov model.…”
Section: System Modelmentioning
confidence: 93%
“…Under the finite state framework, we have proved equation (3) converges to equation (4). The solutions of equation (1) discuss the limit of equation (3), and for a general environment, the differential equation (3) weakly converges to the solution of equation (1) Moreover, we can analyze the evolution of each individual behavior of participants using the Markov model.…”
Section: System Modelmentioning
confidence: 93%
“…In another approach, the epidemic model based information diffusion in network is formulated considering heterogeneous network environments (Stai et al, 2015). Furthermore, the explicit network diffusion model is employed to study malware attacks in wireless networks (Khouzani et al, 2012).…”
Section: Related Workmentioning
confidence: 99%
“…Malware constitutes a serious security threat that slows down the large scale wireless application development. Sometimes your data can crash once you accept or install malware software [43] [44] [45].…”
Section: Radio and Wireless Network Attacksmentioning
confidence: 99%
“…The purpose is sneaked into the system without the knowledge of the administrations [43] [50]. Smartphones are becoming more complex and more dominant in providing more functions; growing concern about the opposite of smartphone users security threats.…”
Section: Radio and Wireless Network Attacksmentioning
confidence: 99%