Table of Contents

Cover image

Title page

Copyright

Preface

List of Figures

List of Tables

Part 1. Malware diffusion modeling framework

Chapter 1. Fundamentals of complex communications networks

1.1. Introduction to Communications Networks and Malicious Software

1.2. A Brief History of Communications Networks and Malicious Software

1.3. Complex Networks and Network Science

Chapter 2. Malware diffusion in wired and wireless complex networks

2.1. Diffusion Processes and Malware Diffusion

2.2. Types of Malware Outbreaks in Complex Networks

2.3. Node Infection Models

Chapter 3. Early malware diffusion modeling methodologies

3.1. Introduction

3.2. Basic Epidemics Models

3.3. Other Epidemics Models

3.4. Miscellaneous Malware Modeling Models

3.5. Scope and Achievements of Epidemics

Part 2. State-of-the-art malware modeling frameworks

Chapter 4. Queuing-based malware diffusion modeling

4.1. Introduction

4.2. Malware Diffusion Behavior and Modeling via Queuing Techniques

4.3. Malware Diffusion Modeling in Nondynamic Networks

4.4. Malware Diffusion Modeling in Dynamic Networks with Churn

Chapter 5. Malware-propagative Markov random fields

5.1. Introduction

5.2. MRFs Background

5.3. Malware Diffusion Modeling Based on MRFs

5.4. Regular Networks

5.5. Complex Networks with Stochastic Topologies

Chapter 6. Optimal control based techniques

6.1. Introduction

6.2. Example—an Optimal Dynamic Attack: Seek and Destroy

6.3. Worm’s Optimal Control

SUMMARY

Chapter 7. Game-theoretic techniques

7.1. Introduction

7.2. System Model

7.3. Network-Malware Dynamic Game

SUMMARY

Chapter 8. Qualitative comparison

8.1. Introduction

8.2. Computational Complexity Comparison

8.3. Implementation Efficiency Comparison

8.4. Sensitivity Comparison

8.5. Practical Value Comparison

8.6. Modeling Differences

8.7. Overall Comparison

Part 3. Applications and the road ahead

Chapter 9. Applications of state-of-the-art malware modeling frameworks

9.1. Network Robustness

9.2. Dynamics of Information Dissemination

9.3. Malicious-information Propagation Modeling

Chapter 10. The road ahead

10.1. Introduction

10.2. Open Problems for Queuing-based Approaches

10.3. Open Problems for MRF-based Approaches

10.4. Optimal Control and Dynamic Game Frameworks

10.5. Open Problems for Applications of Malware Diffusion Modeling Frameworks

10.6. General Directions for Future Work

Chapter 11. Conclusions

11.1. Lessons Learned

11.2. Final Conclusions

Part 4. Appendices

Appendix A. Systems of ordinary differential equations

A.1. Initial Definitions

A.2. First-order Differential Equations

A.3. Existence and Uniqueness of a Solution

A.4. Linear Ordinary Differential Equations

A.5. Stability

Appendix B. Elements of queuing theory and queuing networks

B.1. Introduction

B.2. Basic Queuing Systems, Notation, and Little’s Law

B.3. Markovian Systems in Equilibrium

B.4. Reversibility

B.5. Queues in Tandem

B.6. Queuing Networks

Appendix C. Optimal control theory and Hamiltonians

C.1. Basic Definitions, State Equation Representations, and Basic Types of Optimal Control Problems

C.2. Calculus of Variations

C.3. Finding Trajectories that Minimize Performance Measures

C.4. Variational Approach for Optimal Control Problems

C.5. Numerical Determination of Optimal Trajectories

C.6. Relationship Between Dynamic Programming (DP) and Minimum Principle

References

Author Index

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.24.228