Chapter 6

Optimal control based techniques

Abstract

In the previous chapters, we presented a variety of the models of capturing the dynamics and evolution of a malware outbreak in mobile wireless networks. Indeed, one of the goals of developing such models is to use them to analyze how such events can be manipulated (i.e. controlled) by the involved decision-makers. Both an administrator of a network (the defender) and the designer of a contagious malware (attacker) have a variety of parameters through which they can manipulate the spread of the malware in their own favor. In this chapter, we will present the general framework for analyzing how one decision-maker can optimally influence the dynamics of the malware specially in the context of SIR ...

Get Malware Diffusion Models for Modern Complex Networks now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.