Research Article
Evaluation of Malware Spreading in Wireless Multihop Networks with Churn
@INPROCEEDINGS{10.1007/978-3-319-13329-4_6, author={Vasileios Karyotis and Symeon Papavassiliou}, title={Evaluation of Malware Spreading in Wireless Multihop Networks with Churn}, proceedings={Ad Hoc Networks. 6th International ICST Conference, ADHOCNETS 2014, Rhodes, Greece, August 18-19, 2014, Revised Selected Papers}, proceedings_a={ADHOCNETS}, year={2014}, month={11}, keywords={SIS malware Network churn Wireless multihop networks Product-form queuing networks Network robustness}, doi={10.1007/978-3-319-13329-4_6} }
- Vasileios Karyotis
Symeon Papavassiliou
Year: 2014
Evaluation of Malware Spreading in Wireless Multihop Networks with Churn
ADHOCNETS
Springer
DOI: 10.1007/978-3-319-13329-4_6
Abstract
Modeling malware spreading in wireless networks has attracted significant interest lately, since this will increase the robustness of such networks that constitute the lion’s share of Internet access nowadays. However, all of previous works have considered networks with fixed number of devices. In this work, we focus on users that can dynamically join and leave the network (node churn) as a result of the effects of malware, or their own operation, i.e. energy depletion. We adopt and adapt a queuing-based model for malware spreading for the case of wireless distributed networks with churn. The corresponding methodology captures the dynamics of SIS-type malware, where nodes are always prone to receive new or already spreading infections over a long period. The employed framework can be exploited for quantifying network reliability and study network behavior, which can be further used for increasing the robustness of the system against the most severe attacks.