Security

Optimal Malware Attack and Defense in Mobile Wireless Networks

Download Now Free registration required

Executive Summary

Malicious self-replicating codes, known as malware, pose substantial threat to the wireless computing infrastructure. Malware can be used to launch attacks that vary from the less intrusive confidentiality or privacy attacks, such as traffic analysis and eavesdropping, to the more intrusive methods that either disrupt the nodes normal functions such as those in relaying data and establishing end-to-end routes (e.g., sinkhole attacks), or even alter the network traffic and hence destroy the integrity of the information, such as unauthorized access and session hijacking attacks. Malware outbreaks like those of Slammer and Code Red worms in wired Internet have already inflicted expenses of billions of dollars in repair after the viruses rapidly infected thousands of hosts within few hours.

  • Format: PDF
  • Size: 46 KB