Malware Spreading Model for Routers in Wi-Fi Networks

被引:5
作者
Tran Le, Duc [1 ]
Tran, Thong Trung [2 ]
Dang, Khanh Quoc [2 ]
Alkanhel, Reem [3 ]
Muthanna, Ammar [4 ]
机构
[1] Univ Danang, Univ Sci & Technol, Fac Informat Technol, NetSecITDUT Lab, Da Nang 55000, Vietnam
[2] Univ Danang, Univ Sci & Technol, Fac Informat Technol, Da Nang 55000, Vietnam
[3] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, Riyadh 11671, Saudi Arabia
[4] RUDN Univ, Peoples Friendship Univ Russia, Dept Appl Probabil & Informat, Moscow 117198, Russia
关键词
Basic reproduction number; Wi-Fi; mathematical models; SIR model; SCALE-FREE NETWORKS; IEEE; 802.11BE; PROPAGATION; DYNAMICS; CHALLENGES; ATTACK;
D O I
10.1109/ACCESS.2022.3182243
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware attacks have become very common in recent years. The variety and continuous improvement of malware capabilities threaten any network. Wi-Fi is also not an exception in that context. This paper proposes a model describing the spreading of malware in Wi-Fi networks using an epidemiological mathematical model. This model is built on the characteristics of encryption and authentication in Wi-Fi networks. In addition, we also consider state transitions of devices based on some assumptions about modern malware capabilities. We calculate the basic reproduction number R-0 and thereby indicate the condition to limit the spread of malware. This spreading model is analyzed through numerical simulation. Besides, for the readers to have an overview of the main threats and the security capabilities of the Wi-Fi devices, we also briefly present security threats and encryption methods used in Wi-Fi.
引用
收藏
页码:61873 / 61891
页数:19
相关论文
共 110 条
[1]  
Abare G., 2019, INT J SCI RES NETW S, V7, P21
[2]   Simulation Framework for Development and Testing of Autonomous Vehicles [J].
AbdelHamed, Ahmed ;
Tewolde, Girma ;
Kwon, Jaerock .
2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), 2020, :350-355
[3]  
Abdelrahman A, 2018, PROCEEDINGS OF 2018 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), P448, DOI 10.1109/ICCES.2018.8639328
[4]   WiFi Says "Hi!" Back to Strangers! [J].
Abedi, Ali ;
Abari, Omid .
PROCEEDINGS OF THE 19TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS, HOTNETS 2020, 2020, :132-138
[5]  
Abo-Soliman MA, 2017, 2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), P323, DOI 10.1109/ICENCO.2017.8289808
[6]  
Adams J. K, 2019, ARXIV191004325
[7]  
Adithyan A, 2020, INT CONF ADVAN COMPU, P189, DOI [10.1109/ICACCS48705.2020.9074317, 10.1109/icaccs48705.2020.9074317]
[8]  
Alblwi S., 2017, International Conference on Security and Management, P12
[9]   Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions [J].
Alotaibi, Bandar ;
Elleithy, Khaled .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (03) :1261-1290
[10]   Emotet exposed: looking inside highly destructive malware [J].
SophosLabs Research Team .
Network Security, 2019, 2019 (06) :6-11