9.3. Malicious-information Propagation Modeling

In this section, we present an analytical model which is able to capture the behavior of malicious IDD (modeled as SIS epidemics) in wireless multihop networks. Contrary to the case of useful information, regarding malicious/indifferent information, one is interested in the robustness capabilities of the network to sustain such traffic, which in both cases, it is of no use (or it can even be harmful in case of malware). The presented analytical model is based on the approach exploiting queuing theory, but contrary to Chapter 4, here it was applied on the wireless complex topologies shown in Table 9.2.
Contrary to the SI model, in the SIS paradigm employed for the malicious-information spreading, average ...

Get Malware Diffusion Models for Modern Complex Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.