Deakin University
Browse

File(s) under permanent embargo

Modeling malware propagation in smartphone social networks

conference contribution
posted on 2013-01-01, 00:00 authored by S Peng, G Wang, Shui Yu
Smartphones have become an integral part of our everyday lives, such as online information accessing, SMS/MMS, social networking, online banking, and other applications. The pervasive usage of smartphones also results them in enticing targets of hackers and malware writers. This is a desperate threat to legitimate users and poses considerable challenges to network security community. In this paper, we model smartphone malware propagation through combining mathematical epidemics and social relationship graph of smartphones. Moreover, we design a strategy to simulate the dynamic of SMS/MMS-based worm propagation process from one node to an entire network. The strategy integrates infection factor that evaluates the propagation degree of infected nodes, and resistance factor that offers resistance evaluation towards susceptible nodes. Extensive simulations have demonstrated that the proposed malware propagation model is effective and efficient.

History

Event

Trust, Security and Privacy in Computing and Communications. IEEE Conference (12th : 2013 : Melbourne, Victoria)

Pagination

196 - 201

Publisher

IEEE Computer Society

Location

Melbourne, Victoria

Place of publication

Piscataway, N.J.

Start date

2013-07-16

End date

2013-07-18

ISBN-13

9780769550220

Language

eng

Publication classification

E1 Full written paper - refereed; E Conference publication

Copyright notice

2013, IEEE

Title of proceedings

TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications