Abstract
Modeling malware spreading in wireless networks has attracted significant interest lately, since this will increase the robustness of such networks that constitute the lion’s share of Internet access nowadays. However, all of previous works have considered networks with fixed number of devices. In this work, we focus on users that can dynamically join and leave the network (node churn) as a result of the effects of malware, or their own operation, i.e. energy depletion. We adopt and adapt a queuing-based model for malware spreading for the case of wireless distributed networks with churn. The corresponding methodology captures the dynamics of SIS-type malware, where nodes are always prone to receive new or already spreading infections over a long period. The employed framework can be exploited for quantifying network reliability and study network behavior, which can be further used for increasing the robustness of the system against the most severe attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wang, P., Gonzalez, M., Hidalgo, C., Barabasi, A.: Understanding the Spreading Patterns of Mobile Phone Viruses. Science 324, 1071–1075 (2009)
Peng, S., Yu, S., Yang, A.: Smartphone Malware and its Propagation Modeling: A Survey. IEEE Commun. Surv. and Tutorials 16(2), 925–941 (2014)
Wang, Y., Wen, S., Xiang, Y., Zhou, W.: Modeling the Propagation of Worms in Networks: A Survey. IEEE Commun. Surv. and Tutorials 16(2), 942–960 (2014)
Daley, D.J., Gani, J.: Epidemic Modelling: An Introduction. Cambridge University Press (2009)
Karyotis, V., Kakalis, A., Papavassiliou, S.: Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis. Journal of Computer Science and Technology (JCST) 23(3), 389–399 (2008)
Khouzani, M., Sarkar, S., Altman, E.: Maximum Damage Malware Attack in Mobile Wireless Networks. IEEE/ACM Trans Netw. 20(5), 1347–1360 (2012)
Karyotis, V., Papavassiliou, S.: Macroscopic Malware Propagation Dynamics for Wireless Complex Networks with Churn. IEEE Commun. Letters (submitted)
Shiu, Y.-S., Chang, S.Y., Wu, H.-C., Huang, S.C.-H., Chen, H.-H.: Physical Layer Security in Wireless Networks: A Tutorial. IEEE Wirel. Commun. Mag. 18(2), 66–74 (2011)
Zou, C.C., Towsley, D., Gong, W.: Email Virus Propagation Modeling and Analysis, Technical Report: TR-CSE-03-04 (April 2004)
Pastor-Satorras, R., Vespignani, A.: Epidemic Spreading in Scale-Free Networks. Phys. Rev. Lett. 86, 3200–3203 (2001)
Zou, C.C., Gong, W., Towsley, D., Gao, L.: The Monitoring and Early Detection of Internet Worms. IEEE/ACM Trans. Netw. 13(5), 961–974 (2005)
Garetto, M., Gong, W., Towsley, D.: Modeling Malware Spreading Dynamics. In: Proc. 22nd Annual Joint Conf. IEEE Comp. and Commun. Societies (INFOCOM), vol. 3, pp. 1869–1879 (March-April 2003)
Ganesh, A., Massoulie, L., Towsley, D.: The Effect of Network Topology on the Spread of Epidemics. In: Proc. 25th Annual Joint Conf. IEEE Comp. and Commun. Societies (INFOCOM), vol. 2, pp. 1455–1466 (March 2006)
Karyotis, V., Papavassiliou, S., Grammatikou, M., Maglaris, V.: A Novel Framework for Mobile Attack Strategy Modeling and Vulnerability Analysis in Wireless Ad-hoc Networks. Int’l Journal of Security and Networks (IJSN) 1(3/4), 255–265 (2006)
Khouzani, M., Sarkar, S.: Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks. In: Proc. 5th Symp. Inf. Theory and Applications, UCSD (February 2010)
Khouzani, M., Sarkar, S., Altman, E.: Maximum Damage Malware Attack in Mobile Wireless Networks. In: Proc. 29th IEEE Conf. on Computer Communications (INFOCOM) (March 2010)
Holzer, S., Pinkolet, Y.A., Smula, J., Wattenhofer, R.: Monitoring Churn in Wireless Networks. Elsevier Journal of Theoretical Computer Science 453, 29–43 (2012)
Schwartz, M.: Telecommunications Networks. Addison-Wesley, USA (1987)
Bertsekas, D., Gallager, R.: Data Networks, Prentice Hall, 2nd edn., USA (1992)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Karyotis, V., Papavassiliou, S. (2014). Evaluation of Malware Spreading in Wireless Multihop Networks with Churn. In: Mitton, N., Gallais, A., Kantarci, M., Papavassiliou, S. (eds) Ad Hoc Networks. ADHOCNETS 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 140. Springer, Cham. https://doi.org/10.1007/978-3-319-13329-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-13329-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13328-7
Online ISBN: 978-3-319-13329-4
eBook Packages: Computer ScienceComputer Science (R0)