On Modeling Malware Propagation in Generalized Social Networks

被引:75
作者
Cheng, Shin-Ming [1 ]
Ao, Weng Chon [1 ]
Chen, Pin-Yu [1 ]
Chen, Kwang-Cheng [1 ]
机构
[1] Natl Taiwan Univ, Grad Inst Commun Engn, Taipei 10764, Taiwan
关键词
Epidemiology; malware propagation; proximity malware; social network;
D O I
10.1109/LCOMM.2010.01.100830
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A hybrid malware on smart phones can be propagated by both end-to-end messaging services via personal social communications and short-range wireless communication services via spatial social interactions. Inspired from epidemiology, we propose a novel differential equation-based model to analyze the mixed behaviors of delocalized infection and ripple-based propagation for the hybrid malware in generalized social networks consisting of personal and spatial social relations. Validated by simulations, our model serves as the very first analytical model successfully approximating the complicated propagation behaviors of the hybrid malware.
引用
收藏
页码:25 / 27
页数:3
相关论文
共 10 条
  • [1] [Anonymous], MANAGE SCI
  • [2] BOSE A, 2008, P 4 INT C SEC PRIV C
  • [3] Daley DJ, 2001, EPIDEMIC MODELLING I
  • [4] An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks
    De, Pradip
    Liu, Yonghe
    Das, Sajal K.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (03) : 413 - 425
  • [5] Mickens JamesW., 2005, WISE 05, P77, DOI DOI 10.1145/1080793.1080806
  • [6] Epidemic spreading in scale-free networks
    Pastor-Satorras, R
    Vespignani, A
    [J]. PHYSICAL REVIEW LETTERS, 2001, 86 (14) : 3200 - 3203
  • [7] Understanding the Spreading Patterns of Mobile Phone Viruses
    Wang, Pu
    Gonzalez, Marta C.
    Hidalgo, Cesar A.
    Barabasi, Albert-Laszlo
    [J]. SCIENCE, 2009, 324 (5930) : 1071 - 1076
  • [8] Yan Guanhua., 2007, ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, P32, DOI DOI 10.1145/1229285.1229294
  • [9] A Social Network Based Patching Scheme for Worm Containment in Cellular Networks
    Zhu, Zhichao
    Cao, Guohong
    Zhu, Sencun
    Ranjan, Supranamaya
    Nucci, Antonio
    [J]. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, 2009, : 1476 - +
  • [10] Zou CC, 2007, IEEE T DEPEND SECURE, V4, P105, DOI [10.1109/TDSC2007.1001, 10.1109/TDSC.2007.1001]