Malware Diffusion Models for Modern Complex Networks - 1st Edition - ISBN: 9780128027141, 9780128027165

Malware Diffusion Models for Modern Complex Networks

1st Edition

Theory and Applications

Authors: Vasileios Karyotis M.H.R. Khouzani
eBook ISBN: 9780128027165
Paperback ISBN: 9780128027141
Imprint: Morgan Kaufmann
Published Date: 2nd February 2016
Page Count: 324
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
120.00
84.00
84.00
84.00
84.00
84.00
96.00
96.00
73.00
51.10
51.10
51.10
51.10
51.10
58.40
58.40
85.95
60.16
60.16
60.16
60.16
60.16
68.76
68.76
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks.

Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.

Key Features

  • Presents a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators
  • Systematically introduces malware diffusion processes, providing the relevant mathematical background
  • Discusses malware modeling frameworks and how to apply them to complex wireless networks
  • Provides guidelines and directions for extending the corresponding theories in other application domains, demonstrating such possibility by using application models in information dissemination scenarios

Readership

Graduate students, postdoctoral researchers, professors and experienced/interested engineers involved in computer security/malware research

Table of Contents

  • Preface
  • List of Figures
  • List of Tables
  • Part 1. Malware diffusion modeling framework
    • Chapter 1. Fundamentals of complex communications networks
      • 1.1. Introduction to Communications Networks and Malicious Software
      • 1.2. A Brief History of Communications Networks and Malicious Software
      • 1.3. Complex Networks and Network Science
    • Chapter 2. Malware diffusion in wired and wireless complex networks
      • 2.1. Diffusion Processes and Malware Diffusion
      • 2.2. Types of Malware Outbreaks in Complex Networks
      • 2.3. Node Infection Models
    • Chapter 3. Early malware diffusion modeling methodologies
      • 3.1. Introduction
      • 3.2. Basic Epidemics Models
      • 3.3. Other Epidemics Models
      • 3.4. Miscellaneous Malware Modeling Models
      • 3.5. Scope and Achievements of Epidemics
  • Part 2. State-of-the-art malware modeling frameworks
    • Chapter 4. Queuing-based malware diffusion modeling
      • 4.1. Introduction
      • 4.2. Malware Diffusion Behavior and Modeling via Queuing Techniques
      • 4.3. Malware Diffusion Modeling in Nondynamic Networks
      • 4.4. Malware Diffusion Modeling in Dynamic Networks with Churn
    • Chapter 5. Malware-propagative Markov random fields
      • 5.1. Introduction
      • 5.2. MRFs Background
      • 5.3. Malware Diffusion Modeling Based on MRFs
      • 5.4. Regular Networks
      • 5.5. Complex Networks with Stochastic Topologies
    • Chapter 6. Optimal control based techniques
      • 6.1. Introduction
      • 6.2. Example—an Optimal Dynamic Attack: Seek and Destroy
      • 6.3. Worm’s Optimal Control
      • SUMMARY
    • Chapter 7. Game-theoretic techniques
      • 7.1. Introduction
      • 7.2. System Model
      • 7.3. Network-Malware Dynamic Game
      • SUMMARY
    • Chapter 8. Qualitative comparison
      • 8.1. Introduction
      • 8.2. Computational Complexity Comparison
      • 8.3. Implementation Efficiency Comparison
      • 8.4. Sensitivity Comparison
      • 8.5. Practical Value Comparison
      • 8.6. Modeling Differences
      • 8.7. Overall Comparison
  • Part 3. Applications and the road ahead
    • Chapter 9. Applications of state-of-the-art malware modeling frameworks
      • 9.1. Network Robustness
      • 9.2. Dynamics of Information Dissemination
      • 9.3. Malicious-information Propagation Modeling
    • Chapter 10. The road ahead
      • 10.1. Introduction
      • 10.2. Open Problems for Queuing-based Approaches
      • 10.3. Open Problems for MRF-based Approaches
      • 10.4. Optimal Control and Dynamic Game Frameworks
      • 10.5. Open Problems for Applications of Malware Diffusion Modeling Frameworks
      • 10.6. General Directions for Future Work
    • Chapter 11. Conclusions
      • 11.1. Lessons Learned
      • 11.2. Final Conclusions
  • Part 4. Appendices
    • Appendix A. Systems of ordinary differential equations
      • A.1. Initial Definitions
      • A.2. First-order Differential Equations
      • A.3. Existence and Uniqueness of a Solution
      • A.4. Linear Ordinary Differential Equations
      • A.5. Stability
    • Appendix B. Elements of queuing theory and queuing networks
      • B.1. Introduction
      • B.2. Basic Queuing Systems, Notation, and Little’s Law
      • B.3. Markovian Systems in Equilibrium
      • B.4. Reversibility
      • B.5. Queues in Tandem
      • B.6. Queuing Networks
    • Appendix C. Optimal control theory and Hamiltonians
      • C.1. Basic Definitions, State Equation Representations, and Basic Types of Optimal Control Problems
      • C.2. Calculus of Variations
      • C.3. Finding Trajectories that Minimize Performance Measures
      • C.4. Variational Approach for Optimal Control Problems
      • C.5. Numerical Determination of Optimal Trajectories
      • C.6. Relationship Between Dynamic Programming (DP) and Minimum Principle
  • References
  • Author Index
  • Index

Details

No. of pages:
324
Language:
English
Copyright:
© Morgan Kaufmann 2016
Published:
Imprint:
Morgan Kaufmann
eBook ISBN:
9780128027165
Paperback ISBN:
9780128027141

About the Author

Vasileios Karyotis

Vasileios Karyotis received his Diploma in Electrical and Computer Engineering from the National Technical University of Athens (NTUA), Greece, in June 2004, his M.Sc. degree in Electrical Engineering from the University of Pennsylvania, PA, USA, in August 2005 and his Ph.D. in Electrical and Computer Engineering from NTUA, Greece, in June 2009. Since July 2009 he is with the Network Management and

Optimal Design (NETMODE) Lab of NTUA, Greece, where he is currently a senior researcher.

Dr. Karyotis was awarded a fellowship from the Department of Electrical and Systems Engineering of the University of Pennsylvania (2004-2005) and one of two departmental fellowships for exceptional graduate students from the School of Electrical and Computer Engineering of NTUA (2007-2009).

His research interests span the areas of stochastic modeling and performance evaluation of communications networks, resource allocation, malware propagation and network science.

He has given various tutorial presentations in conferences, workshops and seminars, and he has been a TPC co-chair of the 2014 IEEE INFOCOM workshop on Dynamic Social Networks (DySON) and the 2015 IEEE ICC workshop on Dynamic Social Networks (DySON). He is a member of the Technical Chamber of Greece since 2004, and a member of the IEEE since 2003. He has participated in various R&D projects funded by the EC (FP6, FP7), the European Space Agency (ESA), and the Greek General Secretariat for Research and Technology (GSRT).

Affiliations and Expertise

School of Electrical and Computer Engineering, National Technical University of Athens, Greece

M.H.R. Khouzani

MHR. Khouzani received a B.Sc. degree in Electrical Engineering from Sharif University of Technology in 2006. He subsequently joined the University of Pennsylvania (UPenn) with a fellowship award. He received his Ph.D. in Electrical and Systems Engineering in 2011 with the best dissertation award among his graduation class. He has since held postdoctoral research positions with the Ohio State University (OSU), the University of Southern California (USC), Royal Holloway, University of London (RHUL), and most recently, Queen Mary, University of London (QMUL).

Dr. Khouzani's research is in the area of communication networks and cyber-security. He uses diverse analytical tools from areas such as probability, statistics, control theory, optimization, and decision and game theory, to contribute to the emerging field of the "science of security".

Affiliations and Expertise

School of Electronic Engineering and Computer Science, Queen Mary University of London, U.K.