Skip to main content

Evaluation of Malware Spreading in Wireless Multihop Networks with Churn

  • Conference paper
  • First Online:
Ad Hoc Networks (ADHOCNETS 2015)

Abstract

Modeling malware spreading in wireless networks has attracted significant interest lately, since this will increase the robustness of such networks that constitute the lion’s share of Internet access nowadays. However, all of previous works have considered networks with fixed number of devices. In this work, we focus on users that can dynamically join and leave the network (node churn) as a result of the effects of malware, or their own operation, i.e. energy depletion. We adopt and adapt a queuing-based model for malware spreading for the case of wireless distributed networks with churn. The corresponding methodology captures the dynamics of SIS-type malware, where nodes are always prone to receive new or already spreading infections over a long period. The employed framework can be exploited for quantifying network reliability and study network behavior, which can be further used for increasing the robustness of the system against the most severe attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, P., Gonzalez, M., Hidalgo, C., Barabasi, A.: Understanding the Spreading Patterns of Mobile Phone Viruses. Science 324, 1071–1075 (2009)

    Article  Google Scholar 

  2. Peng, S., Yu, S., Yang, A.: Smartphone Malware and its Propagation Modeling: A Survey. IEEE Commun. Surv. and Tutorials 16(2), 925–941 (2014)

    Article  Google Scholar 

  3. Wang, Y., Wen, S., Xiang, Y., Zhou, W.: Modeling the Propagation of Worms in Networks: A Survey. IEEE Commun. Surv. and Tutorials 16(2), 942–960 (2014)

    Article  Google Scholar 

  4. Daley, D.J., Gani, J.: Epidemic Modelling: An Introduction. Cambridge University Press (2009)

    Google Scholar 

  5. Karyotis, V., Kakalis, A., Papavassiliou, S.: Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis. Journal of Computer Science and Technology (JCST) 23(3), 389–399 (2008)

    Article  Google Scholar 

  6. Khouzani, M., Sarkar, S., Altman, E.: Maximum Damage Malware Attack in Mobile Wireless Networks. IEEE/ACM Trans Netw. 20(5), 1347–1360 (2012)

    Article  Google Scholar 

  7. Karyotis, V., Papavassiliou, S.: Macroscopic Malware Propagation Dynamics for Wireless Complex Networks with Churn. IEEE Commun. Letters (submitted)

    Google Scholar 

  8. Shiu, Y.-S., Chang, S.Y., Wu, H.-C., Huang, S.C.-H., Chen, H.-H.: Physical Layer Security in Wireless Networks: A Tutorial. IEEE Wirel. Commun. Mag. 18(2), 66–74 (2011)

    Article  Google Scholar 

  9. Zou, C.C., Towsley, D., Gong, W.: Email Virus Propagation Modeling and Analysis, Technical Report: TR-CSE-03-04 (April 2004)

    Google Scholar 

  10. Pastor-Satorras, R., Vespignani, A.: Epidemic Spreading in Scale-Free Networks. Phys. Rev. Lett. 86, 3200–3203 (2001)

    Article  Google Scholar 

  11. Zou, C.C., Gong, W., Towsley, D., Gao, L.: The Monitoring and Early Detection of Internet Worms. IEEE/ACM Trans. Netw. 13(5), 961–974 (2005)

    Article  Google Scholar 

  12. Garetto, M., Gong, W., Towsley, D.: Modeling Malware Spreading Dynamics. In: Proc. 22nd Annual Joint Conf. IEEE Comp. and Commun. Societies (INFOCOM), vol. 3, pp. 1869–1879 (March-April 2003)

    Google Scholar 

  13. Ganesh, A., Massoulie, L., Towsley, D.: The Effect of Network Topology on the Spread of Epidemics. In: Proc. 25th Annual Joint Conf. IEEE Comp. and Commun. Societies (INFOCOM), vol. 2, pp. 1455–1466 (March 2006)

    Google Scholar 

  14. Karyotis, V., Papavassiliou, S., Grammatikou, M., Maglaris, V.: A Novel Framework for Mobile Attack Strategy Modeling and Vulnerability Analysis in Wireless Ad-hoc Networks. Int’l Journal of Security and Networks (IJSN) 1(3/4), 255–265 (2006)

    Article  Google Scholar 

  15. Khouzani, M., Sarkar, S.: Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks. In: Proc. 5th Symp. Inf. Theory and Applications, UCSD (February 2010)

    Google Scholar 

  16. Khouzani, M., Sarkar, S., Altman, E.: Maximum Damage Malware Attack in Mobile Wireless Networks. In: Proc. 29th IEEE Conf. on Computer Communications (INFOCOM) (March 2010)

    Google Scholar 

  17. Holzer, S., Pinkolet, Y.A., Smula, J., Wattenhofer, R.: Monitoring Churn in Wireless Networks. Elsevier Journal of Theoretical Computer Science 453, 29–43 (2012)

    Article  MATH  Google Scholar 

  18. Schwartz, M.: Telecommunications Networks. Addison-Wesley, USA (1987)

    Google Scholar 

  19. Bertsekas, D., Gallager, R.: Data Networks, Prentice Hall, 2nd edn., USA (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasileios Karyotis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Karyotis, V., Papavassiliou, S. (2014). Evaluation of Malware Spreading in Wireless Multihop Networks with Churn. In: Mitton, N., Gallais, A., Kantarci, M., Papavassiliou, S. (eds) Ad Hoc Networks. ADHOCNETS 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 140. Springer, Cham. https://doi.org/10.1007/978-3-319-13329-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13329-4_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13328-7

  • Online ISBN: 978-3-319-13329-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics