The Community for Technology Leaders
2012 ACM/IEEE/SCS 26th Workshop on Principles of Advanced and Distributed Simulation (2005)
Monterey, Californi
June 1, 2005 to June 3, 2005
ISSN: 1087-4097
ISBN: 0-7695-2383-8
pp: 80-87
Shane Markstrum , University of California at Los Angeles
Everett Anderson , University of California at Los Angeles
Peter Reiher , University of California at Los Angeles
Kevin Eustice , University of California at Los Angeles
Mark Hansen , University of California at Los Angeles
ABSTRACT
For worms with known signatures, properly configured firewalls can prevent infection of a network from the outside. However, as several recent worms have shown, portable computers provide worms with an entry point into such networks, since these computers are connected behind the firewall. Once inside, the firewall provides no protection against the worm's further spread. Wireless networks are particularly dangerous in this regard, as the act of connection is often invisible, and improperly configured wireless networks will allow anyone within radio range to connect. In this paper, we use real data on a large-scale wireless deployment to analyze the speed with which a worm could spread if it used only this propagation vector. We discuss several possible solutions and provide analysis on how much protection those solutions would provide.
INDEX TERMS
null
CITATION
Shane Markstrum, Everett Anderson, Peter Reiher, Kevin Eustice, Mark Hansen, "Mobile Contagion: Simulation of Infection and Defense", 2012 ACM/IEEE/SCS 26th Workshop on Principles of Advanced and Distributed Simulation, vol. 00, no. , pp. 80-87, 2005, doi:10.1109/PADS.2005.14
96 ms
(Ver 3.3 (11022016))