Chapter 2

Malware diffusion in wired and wireless complex networks

Abstract

The main subject of this book is modeling the diffusion (dissemination) of malicious software (malware) over various types of complex communication networks, and especially over wireless ones. The previous chapter introduced complex communication networks and presented their structure and features. In this chapter, the focus shifts on modeling the malware dissemination processes. We start with the definition of diffusion processes as generic spreading processes observed across various scenario instances and research disciplines. Then the more specific problem of malware diffusions will be introduced and the most frequently encountered malware outbreaks will be presented. Finally, this chapter will present in detail the most important models that are related with the diffusion of malware in communication networks and can be used more broadly for modeling the spread of information in all types of complex networks as well. The content of this chapter may be considered as a foundation for building malware/information dissemination models over complex networks.

Diffusion processes; Malware diffusion; Malware outbreaks; Node infection models; SI; SIR; SIS

2.1. Diffusion Processes and Malware Diffusion

This section will first introduce the notion of diffusion processes in general, then the more specific process of malware diffusion and finally, it will be involved with more specific types and examples of malware diffusion over wired and wireless communication networks.

2.1.1. General Diffusion Processes

Malware diffusion is a general term used to describe various forms of malware dissemination processes encountered in today’s wired and wireless communication networks. In order to better analyze malware diffusion, the “diffusion” needs to be understood. This subsection will provide a concise overview of the fundamentals of diffusion processes toward enabling such understanding.
The broader notion of diffusion processes is used in various disciplines such as physics, chemical engineering, and material science [145]. Diffusion processes characterize a type of transfer phenomena observed frequently in nature or society, and it can emerge naturally (i.e. spontaneously) or artificially (i.e. in a controlled manner). A distinguishing feature of diffusion compared to other transfer processes is that it results in the mixing of, or the massive spread of large interacting entities, e.g. atomic particles, humans, liquids, or gas molecules, without requiring a bulk transfer. A characteristic example that one may encounter in his/her daily routine is the mixing of two liquids, e.g. pouring red color in a water tank. The random process taking place from the start of the mixing until the whole mixture becomes homogeneous is an instance of diffusion. Thus, diffusion is a gradual random process taking place progressively, as opposed to convection or advection which are rapid transfer processes [57]. Of course, the rate of transfer for diffusion may be relatively fast, but even in such cases the transfer should not take place in bulk form, i.e. if particle diffusion is under discussion, particles can be transferred one by one at very high speeds, but not in clustered groups.
Intuitively, diffusion could be thought of as a process of spreading out, as the Latin origin of the word diffusion suggests.1 In physics, it is defined as the process by which there is a net flow of matter from a region of high concentration to one of low concentration. Thus, when diffusion refers to malware, it describes the process where malware starts from a source node-user, or groups of nodes-users (high malware-concentration area), and progressively spreads or propagates to other users (low malware-concentration areas). Apart from physics (e.g. particle diffusion), chemistry (e.g. diffusion in gases and liquids), and material science (e.g. atomic diffusion in solids) mentioned above, diffusion processes emerge in biology (between cells and chemical substances) in sociology, economics, and finance (as diffusion of people, ideas, and price values) as well.
In mathematics, diffusions appear in two forms. The first is usually encountered in processes that behave like fluids, in which cases, the underlying mathematical modeling is based on systems of partial differential equations obtained by the laws of fluid dynamics [57]. In the second case, diffusion can be identified whenever the concept of random walk2 in ensembles of individuals can be applied [145]. For instance, in physics, particle diffusion that is widely expressed through the stochastic process of Brownian motion [143] is essentially an ensemble of atoms performing random walks in space. So is an ensemble of people exchanging news on a social network such as facebook. In the latter example, news disseminate among humans in a random and gradual contact-based fashion, analogous to physical particles moving from one location to another.

2.1.2. Diffusion of Malware in Communication Networks

For the purposes of this book, it suffices to consider diffusion as a transfer process of some form of “particles,” which will correspond to malware bearers. These “particles” can be packets of a network flow, whole pieces of malware, people, etc., and in general bits of information. The transfer of malware should take place as a type of nonbulk process, and it will be characterized by certain laws, achieving an average transfer rate. In particular, the diffusion of malware may be defined as follows:

Definition 2.1

Malware Diffusion

Malware diffusion describes generically and holistically the process by which any type of malicious software, from simple viruses and local outbreaks to massive worm spreads that can possibly emerge in a communication network, transfer from one user-attacker (or groups of attackers) to another user-node (or groups of users-nodes), eventually contaminating larger components of the network.
Thus, the diffusion process describing malware transfer essentially represents a transfer process of malicious software between nodes belonging to two major interdependent groups, namely, attackers/malicious nodes and legitimate nodes of the network.3 Attackers can be considered as “areas” of high malware concentration, while legitimate nodes as “areas” of no malware concentration, signifying a controlled (artificial) malware flux potential from the high concentration areas to the areas of no malware concentration. Once a node leaves one group, e.g. the group of legitimate nodes, it enters the other one, in this case the group of malicious nodes. Such interdependence dictates the size of the population of each group as a function over time under the assumption of a closed population, while all the rest of decision-making behaviors of nodes are independent. For instance, nodes might be considered to follow their own security policies, which is in contrast to the potential centralized policies followed in major corporal or public infrastructure/utility networks and this could affect the possibility of becoming contaminated by some diffused malware component. Once a node becomes contaminated, the number of legitimate noninfected nodes will decrease by one and the number of infected nodes will increase by one at the same time (interdependence), irrespective of different policies followed by the nodes.
Malware diffusion can be dissected into two major categories, namely, spreading and propagation, denoting two operationally different mechanisms of malware transfer between nodes (Table 2.1). The “spreading” mechanism models scenarios where the transfer of malware takes place only between two specific and distinct groups of nodes, namely, from attack (malicious) nodes to legitimate noninfected nodes. On the contrary, malware propagation describes the cases where infected legitimate nodes are able to contaminate other noninfected legitimate nodes, in addition to the (original) attack nodes. Thus, both malicious and legitimate infected nodes control the dynamics of malware diffusion against the currently noninfected legitimate nodes. This can occur once these legitimate nodes become infected and can last as long as they remain in the infected state. When infected legitimate nodes cannot infect their peers, we will refer to such networks as nonpropagative. In contrast, when a newly infected legitimate node is able to infect other legitimate nodes, we call such networks propagative. In the rest of this book, we stand firm with this convention: we will refer to malware diffusion in nonpropagative networks as malware “spreading,” whereas we denote malware diffusion in propagative networks by malware “propagation.”

Table 2.1

Malware Diffusion Categories and their Coverage in this Book. Symbols ‘+, -, *’ Mean the Corresponding Category is Addressed, Not Addressed, Only Touched Upon in the Book, Respectively

FeaturesContamination Type
Peer-to-peerHybridGroup
Spreading (nonpropagative networks)+-+
Propagation (propagative networks)+-*

image

We also distinguish cases where malware is transferring between pairs of nodes and where the transfer is in bulk between groups of nodes, which can reflect the nature of the underlying communication protocol in use, e.g. unicast versus multicast (Table 2.1). In this book, we will mainly focus on the case of unicast transmissions, and thus malware transfer between pairs of nodes. When transfers occur in bulk, the process cannot be characterized as diffusion in general. Such cases of concurrent group malware spreading or propagation have not been extensively studied, despite the fact that some incidents of such malware outbreak have been observed sporadically. We will return to this issue as a potential future area of research in the later chapters of the book.

2.2. Types of Malware Outbreaks in Complex Networks

In the history of computer and communication networks, numerous malware outbreak incidents have been observed and documented. Some of the emerged outbreaks became popular even among the laymen of the field, due to the considerable impact they had on infrastructures, users’ work, and the local or global economies. Several of these incidents have been also analyzed and quantified with good accuracy based on real measurements and evaluations, e.g. CodeRed[235] worm and Love virus. Nowadays, the detection, measurement, and documentation of malware outbreaks have become more systematic. In this section, we present the most representative types of malware that have been observed to date and then we refer to current and expected emerging malware trends.
Table 2.2 provides some of the most representative types of malware and many of their underlying subcategories, e.g. viruses and their variations. It also provides some notable instances of each malware type, as well as a qualitative severity characterization of their operation based on their overall past outcome. The severity of each attack is qualitatively assessed as “low-average-high.” It should be noted that Table 2.2 is a nonexhaustive summary of malware type classification, and other works in the literature, e.g. [13,52,163,166], can be consulted for more detailed descriptions and analysis.

Table 2.2

A Non-exhaustive Classification of Malware Types with Examples

Malware TypeNotable AttacksSeverity
WormsBlaster, WelchiaHighest
BotnetsSDBot, RBot, Agobot, Spybot, MytobHigh
RabbitFork bombAverage
Logic bombsMedco Health Solutions, Fannie Mae, CSOCAverage
Trojan horseNetbus, Sub7, Back Orifice, Beast, ZeusHigh
Sinkhole/wormholeStyx EK, SweetOrange EKHigh
SpywareCoolWebSearch, WinTools, Zango, ZlobAverage
AdwareTyphoidLow
Trapdoors/BackdoorsSobig, Mydoom, Skynet, MD5Average
DoSTeardrop, Smurf, SYN flood, SockstressHigh
Zombies (DDoS)SPEWS, Blue frog and smartphone attacksAverage
PhishingAOHell, warez, HeartbleedHigh
Viruses (boot-sector, file, macro)CodeRed, Sasser, Melissa, ConfickerHigh
WiFi virusesChameleon (experimental virus)High
Bluetooth virusesCabir, Ronie, CommwarriorAverage
Smartphone virusesCabir, Duts, Skulls, Commwarrior, IkeeHigh
Socialnet app virusesNet-Worm.Win32.Koobface.a/bHigh
Hybrid and blendedStorm worm, Klez, Bobax, CIHHigh
The most frequently encountered types of malware tend to be those that are targeting individual users, rather than those that attack large-scale centralized systems and infrastructures, such as banking, military, and public utility systems. Their severity can be minor or grave depending on the scale of attack and the intelligence of malware. Most of these malware sources are derived from exploiting operating system (OS) holes4 and bugs and rarely due to rather complicated software that is possible to unlock whole software systems. Among the malware types that attack individual users, the most frequently encountered is the worm type and its variations, affecting both Internet and mobile users. Worms usually hit massively and suddenly as many unprotected machines they can, usually after some OS hole has been discovered by hackers. In fact, most of the malware examples employed in the literature refer to attacks by one or more types of worm malware.
In 2001, the CodeRed worm was released only 25 days after a relevant vulnerability was announced, signifying the order of magnitude of the potential capability of malware authors, even a decade ago. Since then, even though significant awareness has been raised and precautions have been taken to avoid similar cases, there still exist several similar incidents, varying in severity and targets. Just for comparison purposes, in 2006, a Microsoft Windows vulnerability was exploited by a worm in only 5 days after it was revealed.
Malware of the worm type, similarly to trojan horses and spyware software, aims mainly at ordinary individual users, rather than the complex centralized grids. Spyware in their turn is malware types that exploit machine vulnerabilities, and typically they exploit the lack of knowledge that characterizes simple users, in order to install themselves into host machines and monitor user activity, obtain passwords, etc., without the user’s consent.
On the other hand, malware of botnet type applies to compromised machines infected by targeted software that the attackers use in order to launch large-scale attacks to important and typically large interconnected systems and networks, frequently of commercial or governmental use, such as public utility and defense networks. A similar purpose is attained by DoS/distributed denial-of-service (DDoS) attacks usually aiming more at the commercial operation of websites in the WWW. A DoS attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A DDoS is where the attack source is more than one and often thousands of unique IP addresses. In such cases, the individual hosts essentially behave as “zombie soldiers” by either infecting even more machines and thus creating a large army of compromised machines, or as soldiers of this army in order to attack large and usually well-guarded network systems. Several documented incidents prove that this has been a very popular and successful practice among the attackers with various undesired results for the legitimate systems and users.
The increase of malware outbreaks in computer and communication networks is nowadays more than ever evident. According to a relevant study by Symantec [195], the last half of 2005, 1896 new outbreaks appeared, corresponding to about 70 new per week. Among those, 50% was characterized as having high severity of their outcome, while about 45% were of medium severity, leaving only a small percentage of 5% exhibiting small severity. In another incident, where the Welchia worm “fought” against the Blaster worm as a released countermeasure, the unrestricted spread of this “patch” created so much additional traffic in the Internet that almost destabilized even well-provisioned critical subnetworks. Perhaps, what is known as the “highlight of worm outbreaks” was registered in 2004 and denoted as War of the Worms between the NetSky, Bagle, and MyDoom worm variants [207]. This war created complex interactions among worms citing instances of one worm terminating another worm. Lately, in March 2012, significant dysfunctions were caused by a DNS Changer Malware involving Internet users, denoted by a name “Operation Click Ghost.” This malware was essentially a bundle of viruses such as TDSS, Alureon, TidServ, and TDL4 viruses that changed DNS settings. Table 2.3 presents a mapping of specific attack threats to the malware types (spreading/propagation) and contamination types (peer-to-peer/group) presented earlier in Table 2.1.

Table 2.3

Mapping of Malware Threats to Malware Attack Types

ThreatMalware TypeContamination Type
WormsPropagationPoint-to-point/group
BotnetsPropagation/spreadingPoint-to-point
Trojan horsesSpreadingPoint-to-point
Sinkhole/wormholeSpreadingPoint-to-point
SpywareSpreadingPoint-to-point
Trapdoors/BackdoorsSpreadingPoint-to-point/group
DoS/DDoSSpreadingGroup/point-to-point
PhishingSpreadingPoint-to-point
WiFi virusesPropagationPoint-to-point/group
Bluetooth virusesPropagationPoint-to-point
Smartphone virusesSpreading/propagationPoint-to-point
Socialnet application virusesSpreadingGroup
All these examples illustrate the variability of outcomes that several malware types and their variations have on the systems over which they propagate. These outcomes may include financial, operational, ethical, and life-critical issues emerging for the attacked networks and their users and in most of the cases the outcomes turn out to be more severe than measured or expected.
Lately, and especially since 2010, the proliferation of smartphones has lead to a paradigm shift in network access services and has also driven several radical changes in the traditional wired infrastructures. It has essentially served as a driver for a paradigm shift in network access from wired to wireless networks and has enabled true mobile access and computing. However, in parallel, an increasing trend in mobile malware emergence has been observed, where the malware modules mainly transfer through mobile devices (tablets and smartphones).
Mobile malware is a malicious software that is specifically built to attack mobile phone or smartphone systems. These types of malware rely on exploits of particular OS and mobile phone software technology and represent a significant portion of malware attacks in today’s computing world, where mobile phones are increasingly common.
Within the category of mobile malware, certain kinds of smartphones are targeted more often than others. Industry research shows that an overwhelming majority of mobile malware targets the Android platform, rather than other popular mobile OS systems, like Apple’s iOS, mainly due to proprietary platform restrictions, etc. Various types of mobile malware include device data spies that log certain kinds of data and deliver it to hackers. Another type of mobile malware is called root malware and gives hackers certain administrative privileges and file access. There are also other kinds of mobile malware that perform automatic transactions or communications without the device holder’s knowledge, signifying a noteworthy variability of mobile malware, similar to the corresponding malware targeted for wired networks.
With mobile malware, essentially a completely new battlefield has emerged, which was previously considered relatively immune due to its low market penetration. In 2012 and according to rough estimates, there were approximately 370 million devices in total, including cellphones, smartphones, and tablets [195]. This indicates a steady paradigm shift in usage toward wireless networking, which also paves the way for a corresponding shift of malware toward wireless networks, and especially those that become more decentralized. It seems that very shortly wireless Internet will have approximately the same volume of malware as the Internet. Regarding smartphones,5 35,000 new mobile malware pieces per day are observed. Malware has increased by 46% due to attacks targeting mobile devices specifically [195]. New usage paradigms introduced by social networking via mobile devices create a new malware diffusion medium, where scarcer resources enable more diverse damage, the bandwidth is now common to all users, the batteries are restricted, and the media access more overcrowded than ever. However, the wireless setting enables novel countermeasures as well. As will be seen in the second part of the book, the state-of-the-art methodologies for modeling malware diffusion over wireless complex networks can reveal the key dynamics of malware diffusion, thus enabling designing more efficient countermeasures, even in the worst-case attack scenarios.

2.3. Node Infection Models

The behavior of a user (network node) that has received malicious software and has been compromised (transition to a state denoted as infected) varies considerably depending on the level of technical knowledge of the user and the device capabilities. It should be noted that for those nodes that receive malware and this software has no effect on them, e.g. they receive a virus through email but an antivirus software or the user is capable of blocking the virus, behave similarly to users that have not received malware at all; thus, they are not considered as truly infected. The behavior of compromised nodes also depends on the features and capabilities of the malware, as well as the structure and employed management policies of the network. Thus, the users of the network individually might be at different states, signifying diverse behavior for the overall system, e.g. even though a significant number of nodes might be infected, the network could behave in an endemic rather than pandemic fashion (malware diffusion remains but does not dominate the whole network). Transitions between the possible node and system states may thus differ considerably. We refer to the corresponding node transition disciplines as node infections models and we describe the most characteristic ones in the rest of this section.
The node infection models are tightly related to the possible states that a legitimate node can be in. Examples of such states with respect to malware diffusion are the susceptible, infected, removed, and dead states. The malware-related states of legitimate nodes considered in this book are presented cumulatively in Table 2.4 with a short description of their interpretation. These states can successfully capture the operational modes of legitimate nodes with respect to malware diffusion, and they will be defined in detail next.

Table 2.4

Legitimate Node States in the Considered Node Infection Models and their Interpretation

Node StateSymbolInterpretation
SusceptibleSNoninfected node
Infected/infectiousIInfected node
RemovedRRecovering node (temporarily removed)
DeadDNode not considered anymore (completely removed)
Susceptible-rSrNoninfected node with recharging capabilities
Infected-rIrInfected node with recharging capabilities
Removed-rRrRecovering node with recharging capabilities
Dead-rDrCompletely removed node with recharging capabilities
In all cases, a node starts clean of any malware disseminating in the network and this state is denoted as susceptible (S) . If a legitimate node receives some form of active malware, which affects the device’s operation (the impact of malware could vary in type and severity depending on factors explained before), the user is denoted as infected (I) . Essentially, this user becomes a victim of the disseminating outbreak and the outcome of this “infection” will be determined (behavior-wise) by the corresponding node infection model, i.e. whether a node will sustain this attack or not defines a different infection model and vice versa. Sometimes the symbol (I) is used to denote a state called infectious in order to better reflect that the corresponding node entering this state is not only infected but also infects other legitimate nodes as well as if it was an attacker. Thus, the infected state is applicable in nonpropagative networks, while the infectious state in propagative ones. If a legitimate user was infected and at the same time it has entered a state where recovery actions take place, the corresponding node state is denoted by removed (R) . This state implies that as long as the node is “removed” it cannot be reinfected by the outbreak, which however also means that the device is not in a fully operational mode as it is the case in the susceptible state (it is similar to being temporarily removed from the network). Finally, the state where the user is practically considered completely removed from the network, i.e. due to a malware depleting all its resources, or due to malware constituting the device nonoperational, or even because a user/administrator decided it was too dangerous to retain the device in the network and concluded to take it offline completely, is denoted as dead (D) .
Given all the above, a formal definition of a node infection model can be provided.

Definition 2.2

Node Infection Model

A node infection model defines the specific states that legitimate nodes can be in, with respect to malware diffusion. It also describes in a generic manner the transitions of users between their possible states, due to malware-related reasons, for various malware types and network paradigms, structures, operations, etc.
Table 2.4 also includes states that refer to networks, where nodes may exhaust their energy but have the capability of recharging. This additional feature may have a significant role in malware diffusion as will be shown in the later chapters.
As explained in Definition 2.2, the node infection model practically describes the succession of the aforementioned legitimate user states, aiming at approximating as accurately as possible the actual behavior (operational state) of the nodes in an attacked network. The {S, I, R, D} states in Table 2.4 are the most basic ones and in fact, the simplest node infection models consider only some of them (i.e. {S, I} is the minimum possible subset of states modeling the outcome of an attack). However, in more complicated networks, additional states could be considered or defined, depending on the actual behavior and developing events taking place. Further extending the previous state space and the node infection models that will be presented in the following could be straightforward or very tough, depending on the corresponding behavior to be modeled in each case. In this book, we will only focus on node infection models on the four states with respect to the state space defined above, and only briefly touch upon cases requiring the definition and application of additional states.
Let us now shift the focus to the description of various fundamental and useful node infection models (state transitions). The simplest state transition is the susceptible image infected, denoted by SI, which models the scenarios where each legitimate user becomes infected and remains so for the rest of its lifetime. Such model is appropriate for describing the behavior of networks under single or multiple attacks with imminent and fatal outcomes, in which, once a node is infected it remains in this state for the rest of its lifetime. This means that for this model, the infected state is absorbing, namely, once a node gets in this state, stays there for ever. Various examples of such malware types are contained in Table 2.3. The SI model is also suitable for the cases where one is interested in whether each node has received a specific piece of malware or not (this could also apply to the dissemination of a specific piece of information, desired or malicious, and whether the members of a population have received it). Most of the earliest epidemics techniques have assumed this type of user/system evolution, as it will be described in the next chapter.
A more advanced model can be considered by observing that in many cases, the impact of malware infection for a device might be determinant. For instance, several types of malware, shown in Table 2.3, can be harmful for the OS and the corresponding machine will be required to be withdrawn and repaired completely. Battery depletion attacks drain the energy of a device at the highest possible rate, reducing its lifetime at a very fast rate. Depleted devices are equivalent to idle machines, i.e. they do not participate in the dynamics of the system evolution, and this is marked by an additional transition from the infected to the removed state. The state transition is now susceptible image infected image removed, and the corresponding node infection model is denoted by SIR. In the removed state, nodes are practically the same as dead and thus, SID could be an alternative acronym. Typically, the SIR identifier is employed in the literature.
From a macroscopic point of view, in a longer observation time interval, a legitimate node of a network receives multiple instances of malware, e.g. within a year a machine might face 10–20 different threats. A typical desktop will be used for a period of at least 5–6 years, within which multiple and diverse malware eventually reaches it. Once a device receives a malicious piece of software, the medium to advanced user (and even the layman after some elapsed time) will typically initiate some type of recovery actions and eventually, even if the host becomes dead for some short period, it will return to the initial state (regarding the specifically identified malware infection). This is a fundamentally different behavior compared to the previous one-way SI and SIR transitions. The new observed behavior is characterized by recurring state transitions. Nodes eventually oscillate between the SI states depending on the maintenance actions and different types of malware received. The corresponding node infection model is denoted as susceptible-infected-susceptible (SIS) and it is one of the most general models considered to study the cumulative and macroscopic behavior of a network when analyzed in the course of time.
Combining the two basic node infection models, SIR and SIS, one is able to obtain a more general model describing the full range of node state transitions for longer time periods (practically spanning all the lifetime of a node) when attacked by multiple malware threats. The latter corresponds to multiple attackers producing threats of different behaviors and characteristics. The specific model is denoted as SIRS, denoting the susceptible-infected-removed-susceptible state transition.
Another interesting node infection model is the susceptible-infected-removed-dead, denoted by SIRD. This model describes effectively behaviors where an initially intact legitimate node receives malware, thus switching to the infected state. After spending some time in that state, in which it could be dysfunctional, not functional at all, or even worse, infective, acting as a malicious node itself, it will make one of the two possible transitions. Either it will be completely removed from the network in which case the transition will be toward the removed state, or toward the dead state, indicating a different type of removal state (usually due to energy depletion or other technical reasons). The transition to the removed state usually denotes that the node is patched and thus permanently protected against the spreading/propagating malware. The SIRD paradigm is popular in modeling specific types of malware, such as the CodeRed worm and its variations, in wired and wireless networks.
Table 2.5 summarizes the node infection models presented in this subsection that will be also considered later in this book, along with a brief explanation. We also provide explicitly the malware type of each node infection model with respect to the classification in Table 2.2, as a quick mapping between node infection models and diffusion dynamics.

Table 2.5

Classification of Node Infection Models

Infection ModelInfection ModelMalware Types
SISimple epidemic spreadingp2p or group spreading
SIREpidemic spreading with patchingp2p or group spreading
SIRDEpidemic spreading with patching and killingp2p or group spreading
SISMacroscopic epidemic propagationp2p or group propagation
SISRMacroscopic epidemic propagation with patchingp2p or group propagation
Fig. 2.1 presents some examples of node infection models with the corresponding applicable node states that may be encountered in practical scenarios. These models may differ considerably in terms of the system behavior and they can describe radically different application scenarios. In the rest of the book, we will study most of them, explaining in detail the setting in which each of these models emerges, and how effective the modeling of malware diffusion is.
Fig. 2.1
FIGURE 2.1 Examples of node infection models of interest.

1 The word diffusion is derived from the Latin word, “diffundere,” which means “to spread out,” i.e. move from an area of high concentration to an area of low concentration.

2 A random walk is a mathematical formalization of a path that consists of a succession of random steps. For example, the path traced by a molecule as it travels in a liquid or a gas, the search path of a foraging animal, the price of a fluctuating stock and the financial status of a gambler can all be modeled mathematically as random walks.

3 Depending on the structure and objective of a complex communication network, more types of nodes may be defined with respect to malware diffusion, as we will be discussed later in the chapter.

4 Such operating system holes are usually denoted by the term ‘vulnerabilities’.

5 In 2011, 428 million new mobile devices were sold, representing 25% of all mobile devices at the time [195].

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset