Worm propagation model in mobile network

被引:4
作者
Chen, Zhide [1 ]
Wang, Meng [1 ]
Xu, Li [1 ]
Wu, Wei [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Key Lab Network Secur & Cryptog, Fuzhou, Fujian Province, Peoples R China
关键词
mobile environment; worm propagation; km model; control factors;
D O I
10.1002/cpe.3566
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the popularity of mobile smart devices and functional diversification, the infection ways of mobile smartphones worm also become diverse. In mobile networks, mobile devices are suffering from the threat of worms all the time. Once the worm outbreaks, it will bring huge losses to mobile phone users and mobile network operators. Researches on mobile worm propagation model allow us to control and detect potential worm threat, according to the characteristics of worm's outbreak. In the paper, we put forward a worm propagation model based on the mobile network environment. After analyzing the model, we then give the simulation for controlling factors affecting worm propagation. This model allows us to have a certain understanding for the spread on the size and speed of the mobile worm and provide effective methods to control the spread of the mobile worm. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:1134 / 1144
页数:11
相关论文
共 50 条
[31]   Analysing and modelling worm propagation speed in the smart grid communication infrastructure [J].
AlMajali, Anas ;
Dweik, Waleed .
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (01) :11-21
[32]   Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation [J].
Zheng, Xufei ;
Li, Tao ;
Fang, Yonghui .
JOURNAL OF SUPERCOMPUTING, 2012, 62 (03) :1451-1479
[33]   Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation [J].
Xufei Zheng ;
Tao Li ;
Yonghui Fang .
The Journal of Supercomputing, 2012, 62 :1451-1479
[34]   Analyzing Impacts of Software Diversity on Worm Propagation in Peer-to-Peer Networks [J].
Zhou, Ying ;
Wu, Zhong-fu ;
Li, Feng ;
Wang, Hao ;
Zhu, Zheng-zhou .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B) :219-225
[35]   Research on Early Warning for Worm Propagation Based on Area-Alert-Level [J].
Zhu Li-na ;
Sun Chao-yi ;
Feng Li .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, :163-+
[36]   Hopf bifurcation and optimal control of a delayed malware propagation model on mobile wireless sensor networks [J].
Zhang, Hu ;
Upadhyay, Ranjit Kumar ;
Liu, Guiyun ;
Zhang, Zizhen .
RESULTS IN PHYSICS, 2022, 41
[37]   The research of worm distributed detection technology based on network security [J].
Tong Xiaojun ;
Zhao Zhangquan ;
Shuai Huimin ;
Wang Zhu .
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, :416-+
[38]   Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones [J].
Peng, Sancheng ;
Wang, Guojun ;
Yu, Shui .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (05) :586-595
[39]   Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks [J].
Peng, Sancheng ;
Wang, Guojun .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :282-287
[40]   Dynamics of the worm transmission in wireless sensor network in the framework of fractional derivatives [J].
Achar, Sindhu J. ;
Baishya, Chandrali ;
Kaabar, Mohammed K. A. .
MATHEMATICAL METHODS IN THE APPLIED SCIENCES, 2022, 45 (08) :4278-4294