Telecommunication networks: protocols, modeling and analysis
Telecommunication networks: protocols, modeling and analysis
International Journal of Security and Networks
Hi-index | 0.00 |
In this paper, we adopt a probabilistic framework for malware spreading and propose a closed queueing network model that is able to describe analytically the aggregated behavior of an ad hoc network attacked by multiple malicious nodes. In our framework, the attackers are assumed to be capable of initially adapting their transmission radii and thus employing different attack strategies.We take on the attacker's perspective and formulate variousoptimization problems with respect to the development of different attack strategies, that address the attackers' objective to harm the network and identify the system parameters that can be exploited toachieve this purpose more effectively.