Workshop on Principles of Advanced and Distributed Simulation (PADS'05) (2005)
June 1, 2005 to June 3, 2005
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/PADS.2005.14
Everett Anderson , University of California at Los Angeles
Kevin Eustice , University of California at Los Angeles
Shane Markstrum , University of California at Los Angeles
Mark Hansen , University of California at Los Angeles
Peter Reiher , University of California at Los Angeles
For worms with known signatures, properly configured firewalls can prevent infection of a network from the outside. However, as several recent worms have shown, portable computers provide worms with an entry point into such networks, since these computers are connected behind the firewall. Once inside, the firewall provides no protection against the worm's further spread. Wireless networks are particularly dangerous in this regard, as the act of connection is often invisible, and improperly configured wireless networks will allow anyone within radio range to connect. In this paper, we use real data on a large-scale wireless deployment to analyze the speed with which a worm could spread if it used only this propagation vector. We discuss several possible solutions and provide analysis on how much protection those solutions would provide.
S. Markstrum, E. Anderson, P. Reiher, K. Eustice and M. Hansen, "Mobile Contagion: Simulation of Infection and Defense," Workshop on Principles of Advanced and Distributed Simulation (PADS'05)(PADS), Monterey, Californi, 2005, pp. 80-87.