Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense
On the effectiveness of automatic patching
Proceedings of the 2005 ACM workshop on Rapid malcode
Performance modeling of epidemic routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
A family of encounter-based broadcast protocols for mobile ad-hoc networks
NGI'04 Proceedings of the First international conference on Wireless Systems and Mobility in Next Generation Internet
Models and analysis of active worm defense
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Encounter-based worms: Analysis and defense
Ad Hoc Networks
Hi-index | 0.00 |
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. We propose models for the worm interaction approach that relies upon automated beneficial worm generation to alleviate problems of worm propagation in such networks. We study and analyze the impact of key mobile node characteristics including node cooperation, immunization, on-off behavior on the worm propagations and interactions. We validate our proposed model using extensive simulations. We also find that, in addition to immunization, cooperation can reduce the level of worm infection. Furthermore, on-off behavior linearly impacts only timing aspect but not the overall infection. Using realistic mobile network measurements, we find that encounters are non-uniform, the trends are consistent with the model but the magnitudes are drastically different. Immunization seems to be the most effective in such scenarios. These findings provide insight that we hope would aid to develop counter-worm protocols in future encounter-based networks.