DocumentCode :
3385035
Title :
Mobile contagion: simulation of infection & defense
Author :
Anderson, Everett ; Eustice, Kevin ; Markstrum, Shane ; Hansen, Mark ; Reiher, Peter
Author_Institution :
Dept. of Comput. Sci., California Univ., Los Angeles, CA, USA
fYear :
2005
fDate :
1-3 June 2005
Firstpage :
80
Lastpage :
87
Abstract :
For worms with known signatures, properly configured firewalls can prevent infection of a network from the outside. However, as several recent worms have shown, portable computers provide worms with an entry point into such networks, since these computers are connected behind the firewall. Once inside, the firewall provides no protection against the worm´s further spread. Wireless networks are particularly dangerous in this regard, as the act of connection is often invisible, and improperly configured wireless networks allows anyone within radio range to connect. In this paper, we use real data on a large-scale wireless deployment to analyze the speed with which a worm could spread if it used only this propagation vector. We discuss several possible solutions and provide analysis on how much protection those solutions would provide.
Keywords :
authorisation; computer networks; digital simulation; invasive software; mobile computing; telecommunication security; computer networks; computer worms; digital simulation; firewalls; mobile computing; portable computers; wireless networks; Computational modeling; Computer networks; Computer science; Computer worms; Information filtering; Information filters; Internet; Portable computers; Protection; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Principles of Advanced and Distributed Simulation, 2005. PADS 2005. Workshop on
ISSN :
1087-4097
Print_ISBN :
0-7695-2383-8
Type :
conf
DOI :
10.1109/PADS.2005.14
Filename :
1443313
Link To Document :
بازگشت