Worm propagation model in mobile network

被引:4
作者
Chen, Zhide [1 ]
Wang, Meng [1 ]
Xu, Li [1 ]
Wu, Wei [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Key Lab Network Secur & Cryptog, Fuzhou, Fujian Province, Peoples R China
关键词
mobile environment; worm propagation; km model; control factors;
D O I
10.1002/cpe.3566
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the popularity of mobile smart devices and functional diversification, the infection ways of mobile smartphones worm also become diverse. In mobile networks, mobile devices are suffering from the threat of worms all the time. Once the worm outbreaks, it will bring huge losses to mobile phone users and mobile network operators. Researches on mobile worm propagation model allow us to control and detect potential worm threat, according to the characteristics of worm's outbreak. In the paper, we put forward a worm propagation model based on the mobile network environment. After analyzing the model, we then give the simulation for controlling factors affecting worm propagation. This model allows us to have a certain understanding for the spread on the size and speed of the mobile worm and provide effective methods to control the spread of the mobile worm. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:1134 / 1144
页数:11
相关论文
共 50 条
[21]   A SURVEY OF INTERNET WORM PROPAGATION MODELS [J].
Su Fei ;
Lin Zhaowen ;
Ma Yan .
PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2009, :453-457
[22]   The cost optimal control system based on the Kermack-Mckendrick worm propagation model [J].
Tong, Xiao-Jun ;
Zhang, Miao ;
Wang, Zhu .
JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2016, 10 (02) :82-89
[23]   Worm propagation modeling considering green worm defense mechanism in complex networks [J].
Asadi, Elham ;
Hosseini, Soodeh .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (03)
[24]   Impact of cybersecurity awareness on mobile malware propagation: A dynamical model [J].
Zhu, Qingyi ;
Luo, Xuhang ;
Liu, Yuhang ;
Gan, Chenquan ;
Wu, Yu ;
Yang, Lu-Xing .
COMPUTER COMMUNICATIONS, 2024, 220 :1-11
[25]   Modeling social worm propagation for advanced persistent threats [J].
Zhou, Peng ;
Gu, Xiaojing ;
Nepal, Surya ;
Zhou, Jianying .
COMPUTERS & SECURITY, 2021, 108
[26]   Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation [J].
Wan, Ming ;
Liu, Ying ;
Tang, Jian-qiang ;
Zhang, Hong-ke ;
Lin, Si-yu .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (05) :868-877
[27]   Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation [J].
Ming Wan ;
Ying Liu ;
Jian-qiang Tang ;
Hong-ke Zhang ;
Si-yu Lin .
International Journal of Computational Intelligence Systems, 2012, 5 :868-877
[28]   Analysis of Delay-Aware Worm Propagation Model in Wireless IoT Systems With Ratio-Dependent Functional Response [J].
Madhusudanan, V. ;
Geetha, R. ;
Murthy, B. S. N. ;
Dao, Nhu-Ngoc ;
Cho, Sungrae .
IEEE ACCESS, 2023, 11 :34968-34976
[29]   A Delayed Epidemic Model for Propagation of Malicious Codes in Wireless Sensor Network [J].
Zhang, Zizhen ;
Kundu, Soumen ;
Wei, Ruibin .
MATHEMATICS, 2019, 7 (05)
[30]   The effect of DNS delays on worm propagation in an IPv6 Internet [J].
Kamra, A ;
Feng, HH ;
Misra, V ;
Keromytis, AD .
IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, :2405-2414