About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
4th International IEEE Conference on Broadband Communications, Networks, Systems

Research Article

Computer Worm Ecology in Encounter-based Networks (Invited Paper)

Download572 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/BROADNETS.2007.4550479,
        author={Sapon Tanachaiwiwat and Ahmed Helmy},
        title={Computer Worm Ecology in Encounter-based Networks (Invited Paper)},
        proceedings={4th International IEEE Conference on Broadband Communications, Networks, Systems},
        publisher={IEEE},
        proceedings_a={BROADNETS},
        year={2010},
        month={5},
        keywords={Ad hoc networks  Communication system security  Computer worms  Data security  Differential equations  Environmental factors  Information security  Internet  Mathematical model  Performance analysis},
        doi={10.1109/BROADNETS.2007.4550479}
    }
    
  • Sapon Tanachaiwiwat
    Ahmed Helmy
    Year: 2010
    Computer Worm Ecology in Encounter-based Networks (Invited Paper)
    BROADNETS
    IEEE
    DOI: 10.1109/BROADNETS.2007.4550479
Sapon Tanachaiwiwat1,*, Ahmed Helmy2,*
  • 1: Ming Hsieh Department of Electrical Engineering University of Southern California, CA
  • 2: Computer and Information Science and Engineering University of Florida, FL
*Contact email: tanachai@usc.edu, helmy@ufl.edu

Abstract

Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information disseminations. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. Because this type of network is highly dynamic and has no specific boundary, we need a fully distributed security response mechanism. We propose the worm interaction approach that relies upon automated beneficial worm generation aiming to alleviate problems of worm propagations in such networks. This work is motivated by the ‘War of the Worms’ of the Internet worms between competing worms such as NetSky, Bagle and MyDoom. To understand the dynamic of worm interactions and its performance, we mathematically model several classes of worms and interactions using ordinary differential equations and analyze their behaviors.

Keywords
Ad hoc networks Communication system security Computer worms Data security Differential equations Environmental factors Information security Internet Mathematical model Performance analysis
Published
2010-05-16
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.1109/BROADNETS.2007.4550479
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL