Modeling malware propagation in smartphone social networks

Peng, Sancheng, Wang, Guojun and Yu, Shui 2013, Modeling malware propagation in smartphone social networks, in TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Computer Society, Piscataway, N.J., pp. 196-201.

Attached Files
Name Description MIMEType Size Downloads

Title Modeling malware propagation in smartphone social networks
Author(s) Peng, Sancheng
Wang, Guojun
Yu, Shui
Conference name Trust, Security and Privacy in Computing and Communications. IEEE Conference (12th : 2013 : Melbourne, Victoria)
Conference location Melbourne, Victoria
Conference dates 16-18 Jul. 2013
Title of proceedings TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Editor(s) [Unknown]
Publication date 2013
Conference series IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Start page 196
End page 201
Total pages 6
Publisher IEEE Computer Society
Place of publication Piscataway, N.J.
Keyword(s) mobile malware
propagation model
Smartphones
SMS/MMS
social relationship graph
Summary Smartphones have become an integral part of our everyday lives, such as online information accessing, SMS/MMS, social networking, online banking, and other applications. The pervasive usage of smartphones also results them in enticing targets of hackers and malware writers. This is a desperate threat to legitimate users and poses considerable challenges to network security community. In this paper, we model smartphone malware propagation through combining mathematical epidemics and social relationship graph of smartphones. Moreover, we design a strategy to simulate the dynamic of SMS/MMS-based worm propagation process from one node to an entire network. The strategy integrates infection factor that evaluates the propagation degree of infected nodes, and resistance factor that offers resistance evaluation towards susceptible nodes. Extensive simulations have demonstrated that the proposed malware propagation model is effective and efficient.
ISBN 9780769550220
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
HERDC collection year 2013
Copyright notice ©2013, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30061636

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 21 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Tue, 18 Mar 2014, 08:28:29 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.