The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (2009 vol.8)
pp: 353-368
Guanhua Yan , Los Alamos National Laboratory, Los Alamos
Stephan Eidenbenz , Los Alamos National Laboratory, Los Alamos
ABSTRACT
In the last few years, the growing popularity of mobile devices has made them attractive to virus and worm writers. One communication channel often exploited by mobile malware is the Bluetooth interface. In this paper, we present a detailed analytical model that characterizes the propagation dynamics of Bluetooth worms. Our model captures not only the behavior of the Bluetooth protocol but also the impact of mobility patterns on the Bluetooth worm propagation. Validation experiments against a detailed discrete-event Bluetooth worm simulator reveal that our model predicts the propagation dynamics of Bluetooth worms with high accuracy. We further use our model to efficiently predict the propagation curve of Bluetooth worms in big cities such as Los Angeles. Our model not only sheds light on the propagation dynamics of Bluetooth worms, but also allows to predict spreading curves of Bluetooth worm propagation in large areas without the high computational cost of discrete-event simulation.
INDEX TERMS
Model Development, Model Validation and Analysis
CITATION
Guanhua Yan, Stephan Eidenbenz, "Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)", IEEE Transactions on Mobile Computing, vol.8, no. 3, pp. 353-368, March 2009, doi:10.1109/TMC.2008.129
REFERENCES
[1] http://www.ececs.uc.edu/cdmc/ucbtucbt.html , 2008.
[2] http://www.isi.edu/nsnam/nsindex.html, 2008.
[3] The Bluetooth Special Interest Group, http:/www.bluetooth.com/, 2008.
[4] A. Bose and K.G. Shin, “On Mobile Viruses Exploiting Messaging and Bluetooth Services,” Proc. Second Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '06), Aug. 2006.
[5] J. Bray and C. Sturman, Bluetooth: Connect without Cables. Prentice Hall, Dec. 2000.
[6] A. Busboom, I. Herwono, M. Schuba, and G. Zavagli, “Unambiguous Device Identification and Fast Connection Setup in Bluetooth,” Proc. Int'l Conf. Next Generation Wireless Networks: Technologies, Protocols, Services and Applications (EuropeanWireless), 2002.
[7] J.N. Daigle, Queueing Theory with Applications to Packet Telecommunication. Springer, 2005.
[8] J. Haartsen, “Bluetooth—The Universal Radio Interface for AdHoc, Wireless Connectivity,” Ericsson Rev., vol. 3, pp. 110-117, 1998.
[9] B. Hoh and M. Gruteser, “Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries,” Proc. Int'l Workshop Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN '06), Mar. 2006.
[10] Los Angeles, California, http://en.wikipedia.org/wiki Los_Angeles,_California , 2008.
[11] J. Medlock and M. Kot, “Spreading Disease: Integro-Differential Equations Old and New,” Math. Biosciences, vol. 184, no. 2, pp.201-222, 2003.
[12] J.W. Mickens and B.D. Noble, “Modeling Epidemic Spreading in Mobile Environments,” Proc. Fourth ACM Workshop Wireless Security (WiSe '05), Sept. 2005.
[13] D.M. Nicol, “The Impact of Stochastic Variance on Worm Propagation and Detection,” Proc. Fourth ACM Workshop Recurring Malcode (WORM '06), Nov. 2006.
[14] http://www.gnu.org/softwareoctave/, 2008.
[15] B.S. Peterson, “Device Discovery in Frequency Hopping Wireless Ad Hoc Networks,” PhD thesis, Air Force Inst. Tech nology, 2004.
[16] Specification of the Bluetooth System: Core, Version 1.1, Feb. 2001.
[17] S. Staniford, V. Paxson, and N. Weaver, “How to Own the Internet in Your Spare Time,” Proc. 11th USENIX Security Symp., 2002.
[18] J. Su, A.G. Miklas, K.K.W. Chan, K. Po, A. Akhavan, S. Saroiu, E.d. Lara, and A. Goel, “A Preliminary Investigation of Worm Infections in a Bluetooth Environment,” Proc. Fourth ACM Workshop Recurring Malcode (WORM), 2006.
[19] C. Taylor and N. Mawston, Bluetooth Market Doubles: CSR Still Gaining Momentum, http:/www.strategyanalytics.net/, 2005.
[20] R.W. Thommes and M.J. Coates, “Epidemiological Modelling of Peer-to-Peer Viruses and Pollution,” Proc. IEEE INFOCOM, 2006.
[21] G. Yan, L. Cuellar, S. Eidenbenz, H.D. Flores, N. Hengartner, and V. Vu, “Bluetooth Worm Propagation: Mobility Pattern Matters,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '07), Mar. 2007.
[22] G. Yan and S. Eidenbenz, “Bluetooth Worms: Models, Dynamics, and Defense Implications,” Proc. 22nd Ann. Computer Security Applications Conf. (ACSAC), 2006.
[23] G. Yan and S. Eidenbenz, “Modeling Propagation Dynamics of Bluetooth Worms,” Proc. 27th IEEE Int'l Conf. Distributed Computing Systems (ICDCS '07), June 2007.
[24] C.C. Zou, W. Gong, and D. Towsley, “Code Red Worm Propagation Modeling and Analysis,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS), 2002.
[25] C.C. Zou, D. Towsley, and W. Gong, “Email Worm Modeling and Defense,” Proc. 13th Int'l Conf. Computer Comm. and Networks (ICCCN), 2004.
33 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool