Encounter-based worms: analysis and defense

In this article they develop the aggressive one-sided interaction worm model for understanding the distributed security response mechanism using beneficial worm in encounter-based network. In addition, we propose the two-group concept on worm propagation in encounter-based networks. We simulate such...

Full description

Saved in:
Bibliographic Details
Published in2006 2nd IEEE Workshop on Wireless Mesh Networks pp. 170 - 172
Main Authors Tanachaiwiwat, S., Helmy, A.
Format Conference Proceeding
LanguageEnglish
Published 2006
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In this article they develop the aggressive one-sided interaction worm model for understanding the distributed security response mechanism using beneficial worm in encounter-based network. In addition, we propose the two-group concept on worm propagation in encounter-based networks. We simulate such worm interaction and find that the inter- encounter rate plays an important role in determining total infectives. We attenuate the vaccination and termination rate to reduce unnecessary communication overhead of individual predator infective, finding that the counter limit that controls the attenuation must be carefully assigned to have equivalent performance as the approach without counter limit does. Further study is needed on modeling encounter patterns of real users. We plan to extract such users' behavior from wireless LAN trace of major universities, e.g. University of Southern California, and Dartmouth College.
ISBN:9781424407323
142440732X
DOI:10.1109/WIMESH.2006.288638