Skip to main content

On Modeling Viral Diffusion in Heterogeneous Wireless Networks

  • Conference paper
Security and Privacy in Mobile Information and Communication Systems (MobiSec 2009)

Abstract

Smart phones and computers now are able to co-work in a wireless environment where malware can propagate. Although many investigations have modeled the spread of malware, little has been done to take into account different characteristics of items to see how they affect disease diffusion in an ad hoc network. We have therefore developed a novel framework, consisting of two models, which consider diversity of objects as well as interactions between their different classes. Our framework is able to produce a huge result space thus makes it appropriate to describe many viral proliferating scenarios. Additionally, we have developed a formula to calculate the possible average number of newly infected devices in the considered system. An important contribution of our work is the comprehension of item diversity, which states that a mixture of device types causes a bigger malware spread as the number of device types in the network increases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, T.M., Robert, J.M.: Worm epidemics in high-speed networks. Computer 37(6), 48–53 (2004)

    Article  Google Scholar 

  2. Coursen, S.: The future of mobile malware. Network Security 2007(8), 7–11 (2007)

    Article  Google Scholar 

  3. Hypponen, M.: Mobile malware. Invited talk, 16th USENIX Security symposium, http://www.usenix.org/events/sec07/tech/hypponen.pdf (accessed, October 2008)

  4. Lancaster, P., Tismenetsky, M.: The theory of matrices: with applications, 2nd edn. Academic Press, London (1985)

    MATH  Google Scholar 

  5. Leavitt, N.: Mobile phones: the next frontiers for hackers? Computer 38(4), 20–23 (2005)

    Article  Google Scholar 

  6. Mickens, J.W., Noble, B.D.: Modeling epidemic spreading in mobile environments. In: ACM Workshop on Wireless Security (2005)

    Google Scholar 

  7. Moore, D., Shannon, C., Claffy, K.: Code-red: A case study on the spread and victims of an Internet worm. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (2002)

    Google Scholar 

  8. Murray, J.D.: Mathematical biology: I. An introduction. Springer, Heidelberg (2002)

    MATH  Google Scholar 

  9. Nekovee, M.: Worm epidemics in wireless ad hoc networks. New Journal of Physics 9 (2007)

    Google Scholar 

  10. BBC news service. Mobiles get anti-virus protection, http://news.bbc.co.uk/2/hi/technology/4207476.stm (accessed, Octorber 2008)

  11. Nguyen, H.-N., Shinoda, Y.: A novel analytical framework to model malware diffusion in heterogeneous wireless networks. In: Proceedings of the 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (2009)

    Google Scholar 

  12. Ortega, J.M.: Matrix theory: A second course. Plenum Press, New York (1987)

    Book  MATH  Google Scholar 

  13. Ramachandran, K., Sikdar, B.: Modeling malware propagation in networks of smart cell phones with spatial dynamics. In: Proceedings of IEEE INFOCOM 2007 (2007)

    Google Scholar 

  14. Ramachandran, K., Sikdar, B.: On the stability of the malware free equilibrium in cell phones networks with spatial dynamics. In: IEEE International Conference on Communications, ICC 2007 (2007)

    Google Scholar 

  15. Su, J., Chan, K.K., Miklas, A.G., Po, K., Akhavan, A., Saroiu, S., Lara, E.D., Goel, A.: A preliminary investigation of worm infections in a bluetooth environment. In: Proceedings of the ACM Workshop on Rapid Malcode, WORM (2006)

    Google Scholar 

  16. Traynor, P., Enck, W., McDaniel, P., LaPorta, T.: Mitigating attacks on open functionality in SMS-capable cellular networks. In: Proceedings of MobiCom 2006 (2006)

    Google Scholar 

  17. Traynor, P., McDaniel, P., LaPorta, T.: On attack causality in Internet-connected cellular networks. In: Proceddings of 16th USENIX Security Symposium (2007)

    Google Scholar 

  18. van den Driessche, P., Watmough, J.: Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. Mathematical Biosciences 180, 29–48 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  19. Wierman, J.C., Marchette, D.J.: Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction. Computational Statistics and Data Analysis 45(1), 3–23 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  20. Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Nguyen, HN., Shinoda, Y. (2009). On Modeling Viral Diffusion in Heterogeneous Wireless Networks . In: Schmidt, A.U., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04434-2_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04434-2_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04433-5

  • Online ISBN: 978-3-642-04434-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics