On the malware spreading over non-propagative wireless ad hoc networks: the attacker's perspective

  • Authors:
  • Vasileios A. Karyotis;Symeon Papavassiliou

  • Affiliations:
  • National Technical University of Athens (NTUA), Athens, Greece;National Technical University of Athens (NTUA), Athens, Greece

  • Venue:
  • Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we adopt a probabilistic framework for malware spreading and propose a closed queueing network model that is able to describe analytically the aggregated behavior of an ad hoc network attacked by multiple malicious nodes. In our framework, the attackers are assumed to be capable of initially adapting their transmission radii and thus employing different attack strategies.We take on the attacker's perspective and formulate variousoptimization problems with respect to the development of different attack strategies, that address the attackers' objective to harm the network and identify the system parameters that can be exploited toachieve this purpose more effectively.