Access Restriction

Author Khouzani, M. H. R. ♦ Sarkar, Saswati ♦ Altman, Eitan
Source CiteSeerX
Content type Text
File Format PDF
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Damage Malware Attack ♦ Mobile Wireless Network ♦ Transmission Range ♦ Pontryagin Maximum Principle ♦ Following Trade-off ♦ Abstract Malware ♦ Initial Phase ♦ Certain Time ♦ Battery-constrained Mobile Wireless Network ♦ Serious Security Risk ♦ Wire-less Application ♦ Susceptible Node ♦ First Step ♦ Battery Resource ♦ Vicious Attack ♦ Overall Infection Propagation Rate ♦ Optimal Attack Policy ♦ Optimal Control Theory ♦ Decision Problem ♦ Infective Node ♦ Optimum Decision Rule ♦ Structural Property ♦ Large Scale Proliferation ♦ Security Threat ♦ Maximum Damage ♦ Infected Node ♦ Propagation Phase ♦ Intelligent Defense Strategy ♦ Network Parameter ♦ Large Cost ♦ Numerical Investigation ♦ Optimal Strategy ♦ Maximum Effort ♦ Epidemic Model
Abstract Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this security threat, we seek to quantify the maximum damage inflicted on the system owing to such outbreaks and identify the most vicious attacks. We represent the propagation of malware in a battery-constrained mobile wireless network by an epidemic model in which the worm can dynamically control the rate at which it kills the infected node and also the transmission range and/or the media scanning rate. At each moment of time, the worm at each node faces the following trade-offs: (i) using larger transmission range and media scanning rate to accelerate its spread at the cost of exhausting the battery and thereby reducing the overall infection propagation rate in the long run or (ii) killing the node to inflict a large cost on the network, however at the expense of loosing the chance of infecting more susceptible nodes at later times. We mathematically formulate the decision problems and utilize Pontryagin Maximum Principle from optimal control theory to quantify the damage that the malware can inflict on the network by deploying optimum decision rules. Next, we establish structural properties of the optimal strategy of the attacker over time. Specifically, we prove that it is optimal for the attacker to defer killing of the infective nodes in the propagation phase until reaching a certain time and then start the slaughter with maximum effort. We also show that in the optimal attack policy, the battery resources are used according to a decreasing function of time, i.e., mostly during the initial phase of the outbreak. Finally, our numerical investigations reveal a framework for identifying intelligent defense strategies that can limit the damage by appropriately selecting network parameters.
Educational Role Student ♦ Teacher
Age Range above 22 year
Educational Use Research
Education Level UG and PG ♦ Career/Technical Study
Publisher Date 2010-01-01