Worm propagation model in mobile network

被引:4
作者
Chen, Zhide [1 ]
Wang, Meng [1 ]
Xu, Li [1 ]
Wu, Wei [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Key Lab Network Secur & Cryptog, Fuzhou, Fujian Province, Peoples R China
关键词
mobile environment; worm propagation; km model; control factors;
D O I
10.1002/cpe.3566
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the popularity of mobile smart devices and functional diversification, the infection ways of mobile smartphones worm also become diverse. In mobile networks, mobile devices are suffering from the threat of worms all the time. Once the worm outbreaks, it will bring huge losses to mobile phone users and mobile network operators. Researches on mobile worm propagation model allow us to control and detect potential worm threat, according to the characteristics of worm's outbreak. In the paper, we put forward a worm propagation model based on the mobile network environment. After analyzing the model, we then give the simulation for controlling factors affecting worm propagation. This model allows us to have a certain understanding for the spread on the size and speed of the mobile worm and provide effective methods to control the spread of the mobile worm. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:1134 / 1144
页数:11
相关论文
共 50 条
[41]   Analysis of routing worm infection rates on an IPv4 network [J].
Gorsuch, James ;
Mullins, Barry ;
Baldwin, Rusty ;
Raines, Richard .
3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, :143-152
[42]   The Effect of P2P-Based Worm Propagation in an IPv6 Internet [J].
Yang, Wei ;
Li, Cheng-dong ;
Chang, Gui-ran ;
Yao, Yu ;
Shen, Xiao-meng .
CEIS 2011, 2011, 15
[43]   Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate [J].
Kown, Su-kyung ;
Jang, Bongsoo ;
Lee, Byoung-Dai ;
Do, Younghae ;
Baek, Hunki ;
Choi, Yoon-Ho .
INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 :90-101
[44]   Machine learning-driven exogenous neural architecture for nonlinear fractional cybersecurity awareness model in mobile malware propagation [J].
Asma, Kiran ;
Raja, Muhammad Asif Zahoor ;
Chang, Chuan-Yu ;
Raja, Muhammad Junaid Ali Asif ;
Shoaib, Muhammad .
CHAOS SOLITONS & FRACTALS, 2025, 192
[45]   Overall-Transparent Dynamic Identifier-Mapping Mechanism Against Scanning and Worm Propagation in the SINET [J].
Linyuan Yao ;
Ping Dong ;
Hongke Zhang ;
Xiaojun Wang .
中国通信, 2020, 17 (05) :137-150
[46]   Overall-Transparent Dynamic Identifier-Mapping Mechanism Against Scanning and Worm Propagation in the SINET [J].
Yao, Linyuan ;
Dong, Ping ;
Zhang, Hongke ;
Wang, Xiaojun .
CHINA COMMUNICATIONS, 2020, 17 (05) :137-150
[47]   Optimal Suppression Algorithm Against Worm Propagation in Wireless Service System for IoT Based on Target Cost Function [J].
Huang Y. ;
Zhou W. ;
Yu B. .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55 (11) :2467-2481
[48]   Efficient search scheme in mobile peer-to-peer network [J].
Zhang, Liyuan ;
Liu, Jie .
2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, :1235-1238
[49]   Research on Access Control Model in Mobile Environment [J].
Zang Xiaoyan ;
Wang Qiuqiu ;
King Kai .
2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, :716-720
[50]   Epidemic spreading model and stability of the networks in mobile environment [J].
Gong Yong-Wang ;
Song Yu-Rong ;
Jiang Guo-Ping .
ACTA PHYSICA SINICA, 2012, 61 (11)