The Community for Technology Leaders
RSS Icon
Issue No.03 - March (2013 vol.12)
pp: 529-541
Chao Gao , Dept. of Comput. Sci., Hong Kong Baptist Univ., Kowloon Tong, China
Jiming Liu , Dept. of Comput. Sci., Hong Kong Baptist Univ., Kowloon Tong, China
Viruses and malwares can spread from computer networks into mobile networks with the rapid growth of smart cellphone users. In a mobile network, viruses and malwares can cause privacy data leakage, extra charges, and remote listening. Furthermore, they can jam wireless servers by sending thousands of spam messages or track user positions through GPS. Because of the potential damages of mobile viruses, it is important for us to gain a deep understanding of the propagation mechanisms of mobile viruses. In this paper, we propose a two-layer network model for simulating virus propagation through both Bluetooth and SMS. Different from previous work, our work addresses the impacts of human behaviors, i.e., operational behavior and mobile behavior, on virus propagation. Our simulation results provide further insights into the determining factors of virus propagation in mobile networks. Moreover, we examine two strategies for restraining mobile virus propagation, i.e., preimmunization and adaptive dissemination strategies drawing on the methodology of autonomy-oriented computing (AOC). The experimental results show that our strategies can effectively protect large-scale and/or highly dynamic mobile networks.
mobile computing, Bluetooth, computer viruses, electronic messaging, autonomy-oriented computing, mobile virus propagation, malware, computer network, mobile network, smart cellphone user, privacy data leakage, spam message, GPS, Global Positioning System, Bluetooth, SMS, Short Messaging Service, preimmunization strategy, adaptive dissemination strategy, Mobile communication, Viruses (medical), Mobile computing, Security, Poles and towers, Humans, Computational modeling, adaptive dissemination, Mobile networks, phone virus, human mobility, autonomy-oriented computing, preimmunization
Chao Gao, Jiming Liu, "Modeling and Restraining Mobile Virus Propagation", IEEE Transactions on Mobile Computing, vol.12, no. 3, pp. 529-541, March 2013, doi:10.1109/TMC.2012.29
[1] D.-H. Shi, B. Lin, H.-S. Chiang, and M.-H. Shih, "Security Aspects of Mobile Phone Virus: A Critical Survey," Industrial Management and Data System, vol. 108, no. 4, pp. 478-494, 2008.
[2] H. Kim, J. Smith, and K.G. Shin, "Detecting Energy-Greedy Anomalies and Mobile Malware Variants," Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys 08), pp. 239-252, 2008.
[3] L. Xie, H. Song, T. Jaeger, and S. Zhu, "A Systematic Approach for Cell-Phone Worm Containment," Proc. 17th Int'l World Wide Web Conf. (WWW '08), pp. 1083-1084, 2008.
[4] N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng, "Stealthy Video Capturer: A New Video-Based Spyware in 3G Smartphones," Proc. Second ACM Conf. Wireless Network Security (WiSec '09), pp. 69-78, 2009.
[5] G. Yan and S. Eidenbenz, "Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)," IEEE Trans. Mobile Computing, vol. 8, no. 3, pp. 353-368, Mar. 2009.
[6] C. Gao, J. Liu, and N. Zhong, "Network Immunization and Virus Propagation in Email Networks: Experimental Evaluation and Analysis," Knowledge and Information Systems, vol. 27, no. 2, pp. 253-279, 2011.
[7] P. Wang, M.C. Gonzalez, C.A. Hidalgo, and A.-L. Barabasi, "Understanding the Spreading Patterns of Mobile Phone Viruses," Science, vol. 324, no. 5930, pp. 1071-1076, 2009.
[8] S. Cheng, W.C. Ao, P. Chen, and K. Chen, "On Modeling Malware Propagation in Generalized Social Networks," IEEE Comm. Letters, vol. 15, no. 1, pp. 25-27, Jan. 2011.
[9] P. De, Y. Liu, and S.K. Das, "An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 8, no. 3, pp. 413-425, Mar. 2009.
[10] P. De, Y. Liu, and S.K. Das, "Deployment Aware Modeling of Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory," ACM Trans. Sensor Networks, vol. 5, no. 3, pp. 1-33, 2009.
[11] M.C. Gonzalez, C.A. Hidalgo, and A.L. Barabasi, "Understanding Individual Human Mobility Patterns," Nature, vol. 453, no. 7196, pp. 779-782, 2008.
[12] C.C. Zou, D. Towsley, and W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet E-Mail Worms," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 105-118, Apr.-June 2007.
[13] L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu, "Designing System-Level Defenses against Cellphone Malware," Proc. IEEE 28th Int'l Symp. Reliable Distributed Systems (SRDS '09), pp. 83-90, 2009.
[14] A. Bose, X. Hu, K.G. Shin, and T. Park, "Behavioral Detection of Malware on Mobile Handsets," Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '08), pp. 225-238, 2008.
[15] F. Li, Y. Yang, and J. Wu, "CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-Based Mobile Networks," Proc. IEEE INFOCOM, pp. 2811-2819, 2010.
[16] G. Zyba, G.M. Voelker, M. Liljenstam, A. Mehes, and P. Johansson, "Defending Mobile Phones from Proximity Malware," Proc. IEEE INFOCOM, pp. 1503-1511, 2009.
[17] P. Wang and M.C. Gonzalez, "Understanding Spatial Connectivity of Individuals with Non Uniform Population Density," Philosophical Trans. Royal Soc. A, vol. 367, no. 1901, pp. 3321-3329, 2009.
[18] A. Mei and J. Stefa, "SWIM: A Simple Model to Generate Small Mobile Worlds," Proc. IEEE INFOCOM, pp. 2106-2113, 2010.
[19] K. Lee, S. Hong, S.J. Kim, I. Rhee, and S. Chong, "SLAW: A Mobility Model for Human Walks," Proc. IEEE INFOCOM, pp. 855-863, 2009.
[20] C. Song, T. Koren, P. Wang, and A.-L. Barabasi, "Modelling the Scaling Properties of Human Mobility," Nature Physics, vol. 6, no. 10, pp. 818-823, 2010.
[21] Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, "A Social Network Based Patching Scheme for Worm Containment in Cellular Networks," Proc. IEEE INFOCOM, pp. 1476-1484, 2009.
[22] E.V. Ruitenbeek and F. Stevens, "Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms," Proc. 37th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN '07), pp. 790-800, 2007.
[23] J. Liu, "Autonomy-Oriented Computing (AOC): The Nature and Implications of a Paradigm for Self-Organized Computing," Proc. Fourth Int'l Conf. Natural Computation (ICNC '08), pp. 3-11, 2008.
[24] J. Liu, X. Jin, and K.C. Tsui, Autonomy Oriented Computing (AOC): From Problem Solving to Complex Systems Modeling. Kluwer, 2005.
[25] C. Gao, J. Liu, and N. Zhong, "Network Immunization with Distributed Autonomy-Oriented Entities," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1222-1229, July 2011.
[26] P. Bajardi, C. Poletto, J. Ramasco, M. Tizzoni, V. Colizza, and A. Vespignani, "Human Mobility Networks, Travel Restrictions, and the Global Spread of 2009 H1N1 Pandemic," PLos One, vol. 6, no. 1, p. e16591, 2011.
[27] R. Pastor-Satorras and A. Vespignani, "Epidemic Spreading in Scale-Free Networks," Physical Rev. Letters, vol. 86, no. 14, pp. 3200-3203, 2001.
[28] M.E.J. Newman, "The Spread of Epidemic Disease on Networks," Physical Rev. E, vol. 66, no. 1, p. 016128, 2002.
[29] C. Song, Z. Qu, N. Blumm, and A.-L. Barabasi, "Limits of Predictability in Human Mobility," Science, vol. 327, no. 5968, pp. 1018-1021, 2010.
[30] I. Rhee, M. Shin, S. Hong, K. Lee, and S. Chong, "On the Levy Walk Nature of Human Mobility," Proc. IEEE INFOCOM, pp. 924-932, 2008.
[31] W. Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, "Modeling Time-Variant User Mobility in Wireless Mobile Networks," Proc. IEEE INFOCOM, pp. 758-766, 2007.
[32] C. Fleizach, M. Liljenstam, and P. Johansson, "Can You Infect Me Now? Malware Propagation in Mobile Phone Networks," Proc. ACM Workshop Recurring Malcode (WORM '07), pp. 61-68, 2007.
[33] J. Cheng, S.H.Y. Wong, H. Yang, and S. Lu, "Smartsiren Virus Detection and Alert for Smartphones," Proc. Fifth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '07), pp. 258-271, 2007.
[34] P. Holme, B.J. Kim, C.N. Yoon, and S.K. Han, "Attack Vulnerability of Complex Networks," Physical Rev. E, vol. 65, no. 5, p. 056109, 2002.
[35] C. Gao and J. Liu, "Modeling and Predicting the Dynamics of Mobile Virus Spread Affected by Human Behavior," Proc. IEEE 12th Int'l Symp. a World of Wireless, Mobile and Multimedia Networks (WoWMoM '11), pp. 1-9, 2011.
[36] C. Gao and J. Liu, "Modeling and Restraining Mobile Virus Propagation (Supplementary File)," IEEE Trans. Mobile Computing, 2013.
[37] M. Seshadri, S. Machiraju, A. Sridharan, J. Bolot, C. Faloutsos, and J. Leskovec, "Mobile Call Graphs: Beyond Power-Law and Lognormal Distributions," Proc. 14th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '08), pp. 596-604, 2008.
[38] J.P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, J. Kertesz, and A.L. Barabasi, "Structure and Tie Strengths in Mobile Comm. Networks," Proc. Nat'l Academy of Sciences of USA, vol. 104, no. 18, pp. 7332-7336, 2007.
[39] R.J. Herrnsteind and C. Murray, The Bell Curve. The Free Press, 1994.
[40] X. Meng, P. Zerfos, V. Samanta, S.H. Wong, and S. Lu, "Analysis of the Reliability of a Nationwide Short Message Service," Proc. IEEE INFOCOM, pp. 1811-1819, 2007.
[41] J. Balthrop, S. Forrest, M.E.J. Newman, and M.M. Williamson, "Technological Networks and the Spread of Computer Viruses," Science, vol. 304, no. 5670, pp. 527-529, 2004.
[42] L. Hufnagel, D. Brockmann, and T. Geisel, "Forecast and Control of Epidemics in a Globalized World," Proc. Nat'l Academy of Sciences of USA, vol. 101, no. 42, pp. 15124-15129, 2004.
[43] D. Balcan, V. Colizza, B. Goncalves, H. Hu, J. Ramasco, and A. Vespignani, "Multiscale Mobility Networks and the Spatial Spreading of Infectious Diseases," Proc. Nat'l Academy of Sciences of USA, vol. 106, no. 51, pp. 21484-21489, 2009.
[44] D. Balcan and A. Vespignani, "Phase Transitions in Contagion Processes Mediated by Recurrent Mobility Patterns," Nature Physics, vol. 7, no. 7, pp. 581-586, 2011.
[45] D. Brockmann, L. Hufnagel, and T. Geisel, "The scaling Laws of Human Travel," Nature, vol. 439, no. 7075, pp. 462-465, 2006.
[46] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, "Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms," Proc. IEEE INFOCOM, pp. 606-620, 2006.
[47] Y. Chen, G. Paul, S. Havlin, F. Liljeros, and H.E. Stanley, "Finding a Better Immunization Strategy," Physical Rev. Letters, vol. 101, no. 5, p. 058701, 2008.
[48] R. Cohen, S. Havlin, and D. Ben-Averaham, "Efficient Immunization Strategies for Computer Networks and Populations," Physical Rev. Letters, vol. 91, no. 24, p. 247901, 2003.
[49] T. Bu and D. Towsley, "On Distinguishing Between Internet Power Law Topology Generators," Proc. IEEE INFOCOM, pp. 638-647, 2002.
[50] S. Bansal, J. Read, B. Pourbohloul, and L.A. Meyers, "The Dynamic Nature of Contact Networks in Infectious Disease Epidemilogy," J. Biological Dynamics, vol. 4, no. 5, pp. 478-489, 2010.
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool