1,478 research outputs found
WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick?
In densely populated urban areas WiFi routers form a tightly interconnected
proximity network that can be exploited as a substrate for the spreading of
malware able to launch massive fraudulent attack and affect entire urban areas
WiFi networks. In this paper we consider several scenarios for the deployment
of malware that spreads solely over the wireless channel of major urban areas
in the US. We develop an epidemiological model that takes into consideration
prevalent security flaws on these routers. The spread of such a contagion is
simulated on real-world data for geo-referenced wireless routers. We uncover a
major weakness of WiFi networks in that most of the simulated scenarios show
tens of thousands of routers infected in as little time as two weeks, with the
majority of the infections occurring in the first 24 to 48 hours. We indicate
possible containment and prevention measure to limit the eventual harm of such
an attack.Comment: 22 pages, 1 table, 4 figure
Spreading processes in Multilayer Networks
Several systems can be modeled as sets of interconnected networks or networks
with multiple types of connections, here generally called multilayer networks.
Spreading processes such as information propagation among users of an online
social networks, or the diffusion of pathogens among individuals through their
contact network, are fundamental phenomena occurring in these networks.
However, while information diffusion in single networks has received
considerable attention from various disciplines for over a decade, spreading
processes in multilayer networks is still a young research area presenting many
challenging research issues. In this paper we review the main models, results
and applications of multilayer spreading processes and discuss some promising
research directions.Comment: 21 pages, 3 figures, 4 table
Applications of Temporal Graph Metrics to Real-World Networks
Real world networks exhibit rich temporal information: friends are added and
removed over time in online social networks; the seasons dictate the
predator-prey relationship in food webs; and the propagation of a virus depends
on the network of human contacts throughout the day. Recent studies have
demonstrated that static network analysis is perhaps unsuitable in the study of
real world network since static paths ignore time order, which, in turn,
results in static shortest paths overestimating available links and
underestimating their true corresponding lengths. Temporal extensions to
centrality and efficiency metrics based on temporal shortest paths have also
been proposed. Firstly, we analyse the roles of key individuals of a corporate
network ranked according to temporal centrality within the context of a
bankruptcy scandal; secondly, we present how such temporal metrics can be used
to study the robustness of temporal networks in presence of random errors and
intelligent attacks; thirdly, we study containment schemes for mobile phone
malware which can spread via short range radio, similar to biological viruses;
finally, we study how the temporal network structure of human interactions can
be exploited to effectively immunise human populations. Through these
applications we demonstrate that temporal metrics provide a more accurate and
effective analysis of real-world networks compared to their static
counterparts.Comment: 25 page
- …