Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism

Both in traditional social network and in mobile network environment, the worm is a serious threat, and this threat is growing all the time. Mobile smartphones generally promote the development of mobile network. The traditional antivirus technologies have become powerless when facing mobile networks. The development of benign worms, especially active benign worms and passive benign worms, has become a new network security measure. In this paper, we focused on the spread of worm in mobile environment and proposed the benign worm control and repair mechanism. The control process of mobile benign worms is divided into two stages: the first stage is rapid repair control, which uses active benign worm to deal with malicious worm in the mobile network; when the network is relatively stable, it enters the second stage of postrepair and uses passive mode to optimize the environment for the purpose of controlling the mobile network. Considering whether the existence of benign worm, we simplified the model and analyzed the four situations. Finally, we use simulation to verify the model. This control mechanism for benign worm propagation is of guiding significance to control the network security.

[1]  Tao Li,et al.  Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation , 2012, The Journal of Supercomputing.

[2]  Seong-Moo Yoo,et al.  Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense , 2009, KSII Trans. Internet Inf. Syst..

[3]  Giovanni Vigna,et al.  Using Labeling to Prevent Cross-Service Attacks Against Smart Phones , 2006, DIMVA.

[4]  Sihan Qing,et al.  A survey and trends on Internet worms , 2005, Comput. Secur..

[5]  Niels Provos,et al.  A Virtual Honeypot Framework , 2004, USENIX Security Symposium.

[6]  A. Kohn [Computer viruses]. , 1989, Harefuah.

[7]  William H. Sanders,et al.  Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[8]  Jun Xu,et al.  WORM vs. WORM: preliminary study of an active counter-attack mechanism , 2004, WORM '04.

[9]  Dong Li,et al.  An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.

[10]  Michele Maggiore,et al.  Theory and experiments , 2008 .

[11]  Hong Zhao,et al.  Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms , 2007, Sixth International Conference on Networking (ICN'07).

[12]  Kang G. Shin,et al.  Proactive security for mobile messaging networks , 2006, WiSe '06.

[13]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .