CC2: Defending Hybrid Worm on Mobile Networks with Two-Dimensional Circulation Control

As the hybrid worm can propagate by both personal social interactions and wireless communications, it has been identified as one of the most severe threats to the mobile Internet. This problem is expected to become worse with the boom of social applications and mobile services. In this work, we study the propagation dynamics of hybrid worms and propose a systematic countermeasure. The system maintains a set of community structure which describes the high-speed infection zone of worms and contains worm propagation by distributing the worm signature to the guard nodes selected from the periphery of each community. For those nodes that are geographically close but located in different communities , we evaluate the communication security between them based on the observed infection history and limit communications between insecure ones to avoid the worm spreading across communities. We also design an efficient worm signature forwarding strategy that enables most nodes in the network to reach an immune state before being infected by the worm. Extensive real-trace driven simulations verify the feasibility and effectiveness of the proposed methods.

[1]  Marco Fiore,et al.  Worm Epidemics in Vehicular Networks , 2015, IEEE Transactions on Mobile Computing.

[2]  Kang G. Shin,et al.  Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.

[3]  Réka Albert,et al.  Near linear time algorithm to detect community structures in large-scale networks. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.

[4]  Brian D. Noble,et al.  Modeling epidemic spreading in mobile environments , 2005, WiSe '05.

[5]  Brian Thompson,et al.  Slowing the spread of Bluetooth-based malware in mobile tactical networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[6]  Sajal K. Das,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MOBILE COMPUTING An Epidemic Theoretic Framework for Vulnerability Analysi , 2022 .

[7]  Krishna P. Gummadi,et al.  Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.

[8]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[9]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[10]  Wanlei Zhou,et al.  On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Kwang-Cheng Chen,et al.  On Modeling Malware Propagation in Generalized Social Networks , 2011, IEEE Communications Letters.

[12]  Mao-Bin Hu,et al.  Detect overlapping and hierarchical community structure in networks , 2008, ArXiv.

[13]  Yonggang Wen,et al.  Algorithms and Applications for Community Detection in Weighted Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[14]  Dawei Zhao,et al.  Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation , 2019, IEEE Transactions on Information Forensics and Security.

[15]  M E J Newman,et al.  Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.

[16]  Albert-László Barabási,et al.  Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.

[17]  Wang Haibo,et al.  An immunization strategy for social network worms based on network vertex influence , 2015, China Communications.

[18]  Geoffrey M. Voelker,et al.  Defending Mobile Phones from Proximity Malware , 2009, IEEE INFOCOM 2009.

[19]  Hasan Çam,et al.  Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.

[20]  Min Wu,et al.  Containing smartphone worm propagation with an influence maximization algorithm , 2014, Comput. Networks.

[21]  Azzedine Boukerche,et al.  Countermeasures against Worm Spreading , 2019, ACM Comput. Surv..

[22]  Yang Xiang,et al.  Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[23]  Sencun Zhu,et al.  Improving sensor network immunity under worm attacks: A software diversity approach , 2016, Ad Hoc Networks.

[24]  Mostafa Salehi,et al.  A local immunization strategy for networks with overlapping community structure , 2017 .

[25]  Xiaomei Zhang,et al.  Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks , 2017, IEEE/ACM Transactions on Networking.

[26]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[27]  Lu-Xing Yang,et al.  A Novel Virus-Patch Dynamic Model , 2015, PloS one.

[28]  Songwu Lu,et al.  Analysis of the Reliability of a Nationwide Short Message Service , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[29]  Pilwon Kim,et al.  Epidemic Spreading in Complex Networks with Resilient Nodes: Applications to FMD , 2018, Complex..

[30]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[31]  Xiaomei Zhang,et al.  Infectious Disease Containment Based on a Wireless Sensor System , 2016, IEEE Access.

[32]  Boleslaw K. Szymanski,et al.  Overlapping community detection in networks: The state-of-the-art and comparative study , 2011, CSUR.

[33]  N. Christakis,et al.  Social Network Sensors for Early Detection of Contagious Outbreaks , 2010, PloS one.

[34]  Stefan Saroiu,et al.  A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.

[35]  Azzedine Boukerche,et al.  A Novel Infrastructure-Based Worm Spreading Countermeasure for Vehicular Networks , 2018, IEEE Transactions on Intelligent Transportation Systems.

[36]  Alfred O. Hero,et al.  Multilayer Spectral Graph Clustering via Convex Layer Aggregation: Theory and Algorithms , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[37]  Jiming Liu,et al.  Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.

[38]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.

[39]  Eduard Heindl,et al.  Understanding the spreading patterns of mobile phone viruses , 2012 .

[40]  Donald F. Towsley,et al.  Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.