Malware Diffusion Models for Modern Complex Networks: Theory and Applications

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks.

Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.

Author(s): Vasileios Karyotis, M.H.R. Khouzani
Publisher: Morgan Kaufmann
Year: 2016

Language: English
Pages: 301
City: Burlington

Half-Title-Page_2016_Malware-Diffusion-Models-for-Wireless-Complex-Networks
Title-Page_2016_Malware-Diffusion-Models-for-Wireless-Complex-Networks
Malware Diffusion Models for Modern Complex Networks
Copyright_2016_Malware-Diffusion-Models-for-Wireless-Complex-Networks
Copyright
Table-of-Contents_2016_Malware-Diffusion-Models-for-Wireless-Complex-Network
Table of Contents
Preface_2016_Malware-Diffusion-Models-for-Wireless-Complex-Networks
Preface
List-of-Figures_2016_Malware-Diffusion-Models-for-Wireless-Complex-Networks
List of Figures
List-of-Tables_2016_Malware-Diffusion-Models-for-Wireless-Complex-Networks
List of Tables
Part-1---MALWARE-DIFFUSION-MODEL_2016_Malware-Diffusion-Models-for-Wireless-
1 MALWARE DIFFUSION MODELING FRAMEWORK
Chapter-1---Fundamentals-of-complex-c_2016_Malware-Diffusion-Models-for-Wire
1 Fundamentals of Complex Communications Networks
1.1 Introduction to Communications Networks and Malicious Software
1.2 A Brief History of Communications Networks and Malicious Software
1.2.1 From Computer to Communications Networks
1.2.2 The Emergence and Proliferation of Wireless Networks
1.2.3 Malicious Software and the Internet
1.3 Complex Networks and Network Science
1.3.1 Complex Networks
1.3.2 Network Science
1.3.3 Network Graphs Primer
Chapter-2---Malware-diffusion-in-wired-a_2016_Malware-Diffusion-Models-for-W
2 Malware Diffusion in Wired and Wireless Complex Networks
2.1 Diffusion Processes and Malware Diffusion
2.1.1 General Diffusion Processes
2.1.2 Diffusion of Malware in Communication Networks
2.2 Types of Malware Outbreaks in Complex Networks
2.3 Node Infection Models
Chapter-3---Early-malware-diffusion-m_2016_Malware-Diffusion-Models-for-Wire
3 Early Malware Diffusion Modeling Methodologies
3.1 Introduction
3.2 Basic Epidemics Models
3.2.1 Simple (Classical) Epidemic Model---SI Model
3.2.2 General Epidemic Model: Kermack-McKendrick Model
3.2.3 Two-factor Model
3.2.4 Dynamic Quarantine
3.3 Other Epidemics Models
3.3.1 Epidemics Model in Scale-free Networks
3.3.2 Generalized Epidemics-Endemics Models
3.4 Miscellaneous Malware Modeling Models
3.5 Scope and Achievements of Epidemics
Part-2---STATE-OF-THE-ART-MALWARE-M_2016_Malware-Diffusion-Models-for-Wirele
2 STATE-OF-THE-ART MALWARE MODELING FRAMEWORKS
Chapter-4---Queuing-based-malware-d_2016_Malware-Diffusion-Models-for-Wirele
4 Queuing-based Malware Diffusion Modeling
4.1 Introduction
4.2 Malware Diffusion Behavior and Modeling via Queuing Techniques
4.2.1 Basic Assumptions
4.2.2 Mapping of Malware Diffusion to a Queuing Problem
4.3 Malware Diffusion Modeling in Nondynamic Networks
4.3.1 Evaluation Metrics
4.3.2 Steady-state Behavior and Analysis
4.4 Malware Diffusion Modeling in Dynamic Networks with Churn
4.4.1 Malware Diffusion Models and Network Churn
4.4.2 Open Queuing Network Theory for Modeling Malware Spreading in Complex Networks with Churn
4.4.3 Analysis of Malware Propagation in Networks with Churn
4.4.4 Demonstration of Queuing Framework for Malware Spreading in Complex and Wireless Networks
Chapter-5---Malware-propagative-Mar_2016_Malware-Diffusion-Models-for-Wirele
5 Malware-Propagative Markov Random Fields
5.1 Introduction
5.2 Markov Random Fields Background
5.2.1 Markov Random Fields
5.2.2 Gibbs Distribution and Relation to MRFs
5.2.3 Gibbs Sampling and Simulated Annealing
5.3 Malware Diffusion Modeling Based on MRFs
5.4 Regular Networks
5.4.1 Chain Networks
5.4.2 Regular Lattices: Finite and Infinite Grids
5.5 Complex Networks with Stochastic Topologies
5.5.1 Random Networks
5.5.2 Small-world Networks
5.5.3 Scale-free Networks
5.5.4 Random Geometric Networks
5.5.5 Comparison of Malware Diffusion in Complex Topologies
Chapter-6---Optimal-control-base_2016_Malware-Diffusion-Models-for-Wireless-
6 Optimal Control Based Techniques
6.1 Introduction
6.2 Example---an Optimal Dynamic Attack: Seek and Destroy
6.2.1 Dynamics of State Evolution
6.2.2 Objective Functional
6.3 Worm's Optimal Control
6.3.1 Structure of the Maximum Damage Attack
6.3.2 Proof of Theorem 6.1
6.3.3 Proof of Theorem 6.1: Optimal Rate of Killing
Summary
Chapter-7---Game-theoretic-te_2016_Malware-Diffusion-Models-for-Wireless-Com
7 Game-Theoretic Techniques
7.1 Introduction
7.2 System Model
7.3 Network-Malware Dynamic Game
7.3.1 Formulation
7.3.2 A Framework for Computation of the Saddle-point Strategies
7.3.3 Structural Properties of Saddle-point Defense Strategy
7.3.4 Structure of the Saddle-point Attack Strategy
Summary
Chapter-8---Qualitative-comp_2016_Malware-Diffusion-Models-for-Wireless-Comp
8 Qualitative Comparison
8.1 Introduction
8.2 Computational Complexity Comparison
8.3 Implementation Efficiency Comparison
8.4 Sensitivity Comparison
8.5 Practical Value Comparison
8.6 Modeling Differences
8.7 Overall Comparison
Part-3---APPLICATIONS-AND-THE-_2016_Malware-Diffusion-Models-for-Wireless-Co
3 APPLICATIONS AND THE ROAD AHEAD
Chapter-9---Applications-of-state-of-the_2016_Malware-Diffusion-Models-for-W
9 Applications of State-of-the-art Malware ModelingFrameworks
9.1 Network Robustness
9.1.1 Introduction and Objectives
9.1.2 Queuing Model for the Aggregated Network Behavior under Attack
9.1.3 Steady-state Behavior and Analysis
9.1.4 Optimal Attack Strategies
9.1.5 Robustness Analysis for Wireless Multihop Networks
9.1.6 Conclusions
9.2 Dynamics of Information Dissemination
9.2.1 Introduction to Information Dissemination
9.2.2 Previous Works on Information Dissemination
9.2.3 Epidemic-based Modeling Framework for IDD in Wireless Complex Communication Networks
9.2.4 Wireless Complex Networks Analyzed and Assessment Metrics
9.2.5 Useful-information Dissemination Epidemic Modeling
9.3 Malicious-information Propagation Modeling
9.3.1 SIS Closed Queuing Network Model
Chapter-10---The-road-ah_2016_Malware-Diffusion-Models-for-Wireless-Complex-
10 The Road Ahead
10.1 Introduction
10.2 Open Problems for Queuing-based Approaches
10.3 Open Problems for MRF-based Approaches
10.4 Optimal Control and Dynamic Game Frameworks
10.5 Open Problems for Applications of Malware Diffusion Modeling Frameworks
10.6 General Directions for Future Work
Chapter-11---Conclusio_2016_Malware-Diffusion-Models-for-Wireless-Complex-Ne
11 Conclusions
11.1 Lessons Learned
11.2 Final Conclusions
Part-4---APPENDICES_2016_Malware-Diffusion-Models-for-Wireless-Complex-Netwo
4 APPENDICES
Appendix-A---Systems-of-ordinary-dif_2016_Malware-Diffusion-Models-for-Wirel
A Systems of Ordinary Differential Equations
A.1 Initial Definitions
A.2 First-order Differential Equations
A.3 Existence and Uniqueness of a Solution
A.4 Linear Ordinary Differential Equations
A.5 Stability
Appendix-B---Elements-of-queuing-theo_2016_Malware-Diffusion-Models-for-Wire
B Elements of Queuing Theory and Queuing Networks
B.1 Introduction
B.2 Basic Queuing Systems, Notation, and Little's Law
B.2.1 Elements of a Queuing System
B.2.2 Fundamental Notation and Quantities of Interest
B.2.3 Relation Between Arrival-Departure Processes and Little's Law
B.3 Markovian Systems in Equilibrium
B.3.1 Discrete-time Markov Chains
B.3.2 Continuous-time Markov Processes
B.3.3 Birth-and-Death Processes
B.3.4 The M/M/1 Queuing System
B.3.5 The M/M/m System and Other Multiserver Queuing Systems
B.4 Reversibility
B.5 Queues in Tandem
B.6 Queuing Networks
B.6.1 Analytical Solution of Two-queue Closed Queuing Network
Appendix-C---Optimal-control-theory_2016_Malware-Diffusion-Models-for-Wirele
C Optimal Control Theory and Hamiltonians
C.1 Basic Definitions, State Equation Representations, and Basic Types of Optimal Control Problems
C.2 Calculus of Variations
C.3 Finding Trajectories that Minimize Performance Measures
C.3.1 Functionals of a Single Function
C.3.2 Functionals of Several Independent Functions
C.3.3 Piecewise-smooth Extremals
C.3.4 Constrained Extrema
C.4 Variational Approach for Optimal Control Problems
C.4.1 Necessary Conditions for Optimal Control
C.4.2 Pontryagin's Minimum Principle
C.4.3 Minimum-time Problems
C.4.4 Minimum Control-effort Problems
C.4.5 Singular Intervals in Optimal Control Problems
C.5 Numerical Determination of Optimal Trajectories
C.5.1 Steepest Descent
C.5.2 Variation of Extremals
C.5.3 Quasilinearization
C.5.4 Gradient Projection
C.6 Relationship Between Dynamic Programming (DP) and Minimum Principle
No-title-available_2016_Malware-Diffusion-Models-for-Wireless-Complex-Networ
Bibliography
Author-Index_2016_Malware-Diffusion-Models-for-Wireless-Complex-Networks
Author Index
No-title-available_2016_Malware-Diffusion-Models-for-Wireless-Complex-Netwo1
Subject Index