Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis

来源 :Journal of Computer Science & Technology | 被引量 : 0次 | 上传用户:qnmdmmmm
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In this paper,the spreading of malicious software over ad hoc networks,where legitimate nodes are prone to propagate the infections they receive from either an attacker or their already infected neighbors,is analyzed.Considering the Susceptible-Infected-Susceptible(SIS)node infection paradigm we propose a probabilistic model,on the basis of the theory of closed queuing networks,that aims at describing the aggregated behavior of the system when attacked by malicious nodes.Because of its nature,the model is also able to deal more effectively with the stochastic behavior of attackers and the inherent probabilistic nature of the wireless environment.The proposed model is able to describe accurately the asymptotic behavior of malware-propagative large scale ad hoc networking environments.Using the Norton equivalent of the closed queuing network,we obtain analytical results for its steady state behavior,which in turn is used for identifying the critical parameters affecting the operation of the network.Finally,through modeling and simulation,some additional numerical results are obtained with respect to the behavior of the system when multiple attackers are present,and regarding the time-dependent evolution and impact of an attack. In this paper, the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from either an attacker or their already infected neighbors, is analyzed. Conscious of the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, on the basis of the theory of closed queuing networks, that aims at describing the aggregated behavior of the system when attacked by malicious nodes.Because of its nature, the model is also able to deal more effectively with the stochastic behavior of attackers and the inherent probabilistic nature of the wireless environment the proposed model is able to describe accurately the asymptotic behavior of malware-propagative large scale ad hoc networking environments. Using the Norton equivalent of the closed queuing network, we obtain analytical results for its steady state behavior, which in turn is used for identifying the critical parameters affecting the operation of the network. Finally, through modeling and simulation, some additional numerical results are obtained with respect to the behavior of the system when multiple attackers are present, and regarding the time-dependent evolution and impact of an attack.
其他文献
目的 研究和探讨杞菊地黄汤加减沐足治疗老年高血压合并失眠的临床疗效.方法 选取100例老年高血压合并失眠患者为研究对象,按照治疗方法不同分为对照组(50例,常规西药降压),
目的 探讨中药配方颗粒与传统饮片水煎剂治疗银屑病患者超氧化物歧化酶(SOD)、谷胱甘肽过氧化物酶(GSH-Px)的影响及对血热型寻常型银屑病的疗效.方法 将78例血热型寻常型银屑
目的 探讨补阳还五汤治疗脉管炎临床效果.方法 回顾性分析我院2010年10月-2015年10月期间收治的100例脉管炎患者的临床资料,特患者平均分为观察组和对照组,对照组采用扩张血
A new method based on principal component analysis (PCA) and support vector machines (SVMs) is proposed for fault diagnosis of mine hoists. PCA is used to extra
目的 探索脑血管病继发癫痫临床特点与治疗,以期为临床实践提供参考.方法 选取我院于2014年10月至2015年10月间收治的60例脑血管病继发性癫痫患者作为临床研究对象,对其临床
目的 寻求对假性球麻痹更有效的治疗方法.方法 将住院的假性球麻痹患者随机分成两组,第一组给予维生素B12穴位注射配合功能训练,第二组为对照组只采用康复训练的方法.结果 维
Novel chiral tetralin compounds were designed and synthesized, and their antifungal activities in vitro were tested. The results showed that all of target compo
目的 通过中医及西医的不同疗法对照,找出最好的治疗方法.方法 通过临床中医西医治疗各30例患者进行对照,发现最佳治疗方案.结果 发现中医药治疗支原体肺炎疗效明显好于西医
目的 探讨康复运动联合针灸治疗在中风后遗症应用中的临床效果.方法 选择2013年10月至2015年12月来我院进行治疗的中风后遗症患者57名为研究对象,根据患者病情程度及治疗方法
目的 探讨枳实消痞丸加减治疗胃实痞证的临床疗效.方法 选取我院2014年10月-2015年10月间收治的140例胃实痞证患者,通过随机数字表法将140例患者分为中药组及西药组各70例,西