Propagation model of smartphone worms based on semi-Markov process and social relationship graph

Abstract Smartphone applications are getting more and more popular and pervasive in our daily life, and are also attractive to malware writers due to their limited computing source and vulnerabilities. At the same time, we possess limited understanding of our opponents in cyberspace. In this paper, we investigate the propagation model of SMS/MMS-based worms through integrating semi-Markov process and social relationship graph. In our modeling, we use semi-Markov process to characterize state transition among mobile nodes, and hire social network theory, a missing element in many previous works, to enhance the proposed mobile malware propagation model. In order to evaluate the proposed models, we have developed a specific software, and collected a large scale real-world data for this purpose. The extensive experiments indicate that the proposed models and algorithms are effective and practical.

[1]  YiXian Yang,et al.  Epidemic Model of Mobile Phone Virus for Hybrid Spread Mode with Preventive Immunity and Mutation , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[2]  P. Coulton,et al.  Mobile phone vulnerabilities: a new generation of malware , 2004, IEEE International Symposium on Consumer Electronics, 2004.

[3]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[4]  Sancheng Peng,et al.  Modeling Malware Propagation in Smartphone Social Networks , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[5]  Dai Yiqi An Anonymous Node State Transition Model Based on Semi-Markov Process , 2011 .

[6]  Wei Xia,et al.  Commwarrior worm propagation model for smart phone networks , 2008 .

[7]  Chen Chang A Semi-Markov Evaluation Model for the Survivability of Real-Time Database with Intrusion Tolerance , 2011 .

[8]  Legand L. Burge,et al.  Modelling the spread of mobile malware , 2008, Int. J. Comput. Aided Eng. Technol..

[9]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[10]  Stefan Saroiu,et al.  A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.

[11]  Jiaowan Luo,et al.  Stochastic stability of linear systems with semi-Markovian jump parameters , 2005, The ANZIAM Journal.

[12]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[13]  Sancheng Peng,et al.  Survivability modeling and analysis on 3D mobile ad-hoc networks , 2011 .

[14]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[15]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[16]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[17]  San Cheng Peng A Survey on Malware Containment Models in Smartphones , 2012 .

[18]  Heng Zhou,et al.  A Semi-Markov Evaluation Model for the Survivability of Real-Time Database with Intrusion Tolerance: A Semi-Markov Evaluation Model for the Survivability of Real-Time Database with Intrusion Tolerance , 2011 .

[19]  Sancheng Peng,et al.  Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones , 2013, J. Comput. Syst. Sci..

[20]  Sancheng Peng,et al.  Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[21]  Jiming Liu,et al.  Modeling and predicting the dynamics of mobile virus spread affected by human behavior , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[22]  William H. Sanders,et al.  Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[23]  Wenye Wang,et al.  On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures , 2010, IEEE Transactions on Dependable and Secure Computing.

[24]  Maziar Nekovee,et al.  The Opportunistic Transmission of Wireless Worms between Mobile Devices , 2008, ArXiv.

[25]  Jacques Janssen,et al.  Numerical Treatment of Homogeneous Semi-Markov Processes in Transient Case–a Straightforward Approach , 2004 .

[26]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.

[27]  Dong Li,et al.  An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.

[28]  Binshan Lin,et al.  Security aspects of mobile phone virus: a critical survey , 2008, Ind. Manag. Data Syst..