Modeling the Spatio-Temporal Dynamics of Worm Propagation in Smartphones based on Cellular Automata

被引:3
作者
Gonzalez Garcia, Gabriel [1 ]
Larraga Ramirez, Maria Elena [1 ]
机构
[1] Univ Nacl Autonoma Mexico, Inst Ingn, Mexico City 04510, DF, Mexico
来源
UKSIM-AMSS 10TH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS) | 2016年
关键词
Bluetooth networks; cellular automata; complex systems modeling; smartphones security; MALWARE;
D O I
10.1109/EMS.2016.40
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, the expanding smartphone market has become an increasingly attractive target for malicious attacks. This has motivated the continuous development of models to understand the behavior of smartphone malware and describe its spatial propagation. One of possible communication channels for the penetration of mobile malware is the Bluetooth interface, where the malware infects devices in its proximity as biological virus does. In this paper, a new mathematical model to study the spatio-temporal propagation dynamics of Bluetooth worms based on cellular automata and the compartmental epidemiological models is introduced. The model takes into account the local interactions between the smartphones and it is able to simulate the individual dynamic of each mobile device. Furthermore, the model consider the effect of mobility on the infection propagation. Some simulation results indicate that the model captures the spatio-temporal dynamics of Bluetooth worm propagation and facilitates predictions of the evolution of the malware spreading. In addition, the computational cost of the model is low, making it suitable to understand the behavior of a modeled malware and predict the spreading curves of Bluetooth worm propagation in large areas.
引用
收藏
页码:196 / 201
页数:6
相关论文
共 18 条
[1]  
Bakhshi Z., 2015, INT J COMPUT NETW CO, V3, P63
[2]   On Modeling Malware Propagation in Generalized Social Networks [J].
Cheng, Shin-Ming ;
Ao, Weng Chon ;
Chen, Pin-Yu ;
Chen, Kwang-Cheng .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (01) :25-27
[3]  
Curtis S., 2014, QUARTER WORLD WILL B
[4]  
del Rey A.M., 2014, ADV INTELLIGENT SYST, P619, DOI [10.1007/978-3-319-01854-6_63, DOI 10.1007/978-3-319-01854-6_63]
[5]  
Hu Y., 2013, J INFORM COMPUTATION, V10
[6]   Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors [J].
Jackson, Jennifer T. ;
Creese, Sadie .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) :930-943
[7]  
Kermack W.O., 1927, P ROYAL SOC A
[8]   Mathematical modeling of the propagation of malware: a review [J].
Martin del Rey, Angel .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (15) :2561-2579
[9]  
Martínez GJ, 2010, J CELL AUTOM, V5, P289
[10]   Automatic Leak Detection in Buried Plastic Pipes of Water Supply Networks by Means of Vibration Measurements [J].
Martini, Alberto ;
Troncossi, Marco ;
Rivola, Alessandro .
SHOCK AND VIBRATION, 2015, 2015