Analysis of TCP performance over mobile ad hoc networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
Code-Red: a case study on the spread and victims of an internet worm
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
IEEE Security and Privacy
The Georgia Tech Network Simulator
MoMeTools '03 Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research
Proceedings of the 2003 ACM workshop on Rapid malcode
MASCOTS '04 Proceedings of the The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
Requirements on Worm Mitigation Technologies in MANETS
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
MOMOSE: a mobility model simulation environment for mobile wireless ad-hoc networks
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
A MANET simulator (M-SIM) with an extended worm propagation epidemic model
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Hi-index | 0.00 |
Mobile Ad-hoc Networks (MANETs) are used for emergency situations like disaster-relief, military applications, and emergency medical situations. These applications make MANETs attractive targets for cyber- attacks and make the development of counter-measures paramount. The study of worm behavior is critical to the design of effective counter measures in MANET environments. This paper studies the behavior of TCP based worms in MANETs. We develop analytical models for the spread of TCP worms in the MANET environment that account for payload-size, bandwidth-sharing, radio range, nodal density, packet discards and several other parameters specific to MANETs. We present numerical solutions for the models and verify the results using high fidelity packet-level simulations. The results show that the analytical model developed here matches the results of the packet-level simulation in all cases except when topologies result in a high probability of disconnected clusters. Our simulation studies show that under many cases, due to the resource constrained nature of the MANET and its underlying wireless layers, the TCP-based worms rapidly become self-throttling. This may benefit the design of effective mitigation technologies in these critical networking environments.