[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
poster

Optimal propagation of security patches in mobile wireless networks: extended abstract

Published: 14 June 2010 Publication History

Abstract

Reliable security measures against outbreaks of malware is imperative to enable large scale proliferation of wireless technologies. Immunization and healing of the nodes through dissemination of security patches can counter the spread of a malware upon an epidemic outbreak. The distribution of patches however burdens the bandwidth which is scarce in wireless networks. The trade-offs between security risks and resource consumption can be attained by activating at any given time only fractions of dispatchers and dynamically selecting their packet transmission rates. We formulate the above trade-offs as an optimal control problem that seek to minimize the aggregate network costs that depend on security risks and resource consumed by the countermeasures. Using Pontryagin's maximum principle, we prove that the dynamic control strategies have simple structures. When the resource consumption cost is concave, optimal strategy is to use maximum resources for distribution of patches until a threshold time, upon which, the patching should halt. When the resource consumption cost is convex, the above transition is strict but continuous.

References

[1]
D. Grass, J. Caulkins, G. Feichtinger, G. Tragler, and D. Behrens, 'Optimal control of nonlinear processes: with applications in drugs, corruption, and terror', Springer Verlag, 2008.
[2]
M. H. R. Khouzani, S. Sarkar, and E. Altman, 'Dispatch then Stop: Optimal Dissemination of Security Patches in Mobile Wireless Networks', In http://www.seas.upenn.edu/ swati/publication.htm.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGMETRICS Performance Evaluation Review
ACM SIGMETRICS Performance Evaluation Review  Volume 38, Issue 1
Performance evaluation review
June 2010
382 pages
ISSN:0163-5999
DOI:10.1145/1811099
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGMETRICS '10: Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems
    June 2010
    398 pages
    ISBN:9781450300384
    DOI:10.1145/1811039

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 June 2010
Published in SIGMETRICS Volume 38, Issue 1

Check for updates

Author Tags

  1. dynamic patching
  2. optimal control
  3. security-performance trade-off

Qualifiers

  • Poster

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2012)Saddle-Point Strategies in Malware AttackIEEE Journal on Selected Areas in Communications10.1109/JSAC.2012.12010430:1(31-43)Online publication date: Jan-2012
  • (2012)Maximum damage malware attack in mobile wireless networksIEEE/ACM Transactions on Networking10.1109/TNET.2012.218364220:5(1347-1360)Online publication date: 1-Oct-2012
  • (2012)Optimal Dissemination of Security Patches in Mobile Wireless NetworksIEEE Transactions on Information Theory10.1109/TIT.2012.219529558:7(4714-4732)Online publication date: 1-Jul-2012
  • (2011)A dynamic game solution to malware attack2011 Proceedings IEEE INFOCOM10.1109/INFCOM.2011.5935025(2138-2146)Online publication date: Apr-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media