0% found this document useful (0 votes)
33 views3 pages

Optimal Distributed Malware Defense in Mobile Networks With Heterogeneous Devices

The document discusses optimal strategies for distributing malware defense signatures across heterogeneous mobile devices in a network to minimize infections. It aims to deploy efficient defense systems using content-based signatures to detect malware, disable further propagation, and optimize a utility function based on the number of infected nodes through signature allocation.

Uploaded by

Surya Sooriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views3 pages

Optimal Distributed Malware Defense in Mobile Networks With Heterogeneous Devices

The document discusses optimal strategies for distributing malware defense signatures across heterogeneous mobile devices in a network to minimize infections. It aims to deploy efficient defense systems using content-based signatures to detect malware, disable further propagation, and optimize a utility function based on the number of infected nodes through signature allocation.

Uploaded by

Surya Sooriya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Optimal Distributed Malware

Defense in Mobile
Networks with Heterogeneous
Devices

Modified Title
security for handheld devices against malicious

software in mobile network.

ABSTRACT
Deploying an efficient defense system to protect against infection and

to help the infected nodes to recover is important to prevent serious

spreading and outbreaks.


To optimally distribute the content-based signatures of malware,

which helps to detect the corresponding malware.


Disable further propagation to minimize the number of infected

nodes.
Based on the framework of optimizing the system welfare utility

depending on the final number of infected nodes through the signature


allocation.

You might also like