Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm

The enhanced capabilities of smartphones are creating the opportunity for new forms of malware to spread directly between mobile devices over short-range radio. This has been observed already in Bluetooth radios, and WiFi capabilities of smartphones provide an opportune new spreading vector. The increasing complexity of phone operating systems coupled with disclosed vulnerabilities suggest it is simply a matter of time before WiFi based worms are possible. Works that have considered this problem for Bluetooth suggest outbreaks would result in epidemics [11,28,32]. We use traditional epidemiological modeling tools and high-fidelity realistic human mobility data to study the spreading speed of this emergent threat. As opposed to other works, we take in to account the effects of exposure times, wireless propagation radii, and limited population susceptibility. Importantly, we find that lowering the susceptibility of the population to infection gives significant herd immunity as with biological infections, but unlike traditional Internet worms, making such threats unlikely in the near to medium term. Specifically, with susceptibility rates below 10% the result is near total immunity of the population. We find exposure times, and wireless transmission radii have no significant effect on outbreaks.

[1]  Stephan Bohacek,et al.  Realistic mobility simulation of urban mesh networks , 2009, Ad Hoc Networks.

[2]  Kang G. Shin,et al.  Propagation, Detection and Containment of Mobile Malware , 2008 .

[3]  Tristan Henderson,et al.  CRAWDAD: a community resource for archiving wireless data at Dartmouth , 2005, CCRV.

[4]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[5]  Steven Myers,et al.  Mobile location tracking in metro areas: malnets and others , 2010, CCS '10.

[6]  Cecilia Mascolo,et al.  Exploiting temporal complex network metrics in mobile malware containment , 2010, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[7]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[8]  Guanhua Yan,et al.  Bluetooth worm propagation: mobility pattern matters! , 2007, ASIACCS '07.

[9]  Madhav V. Marathe,et al.  EpiNet: a simulation framework to study the spread of malware in wireless networks , 2009, SIMUTools 2009.

[10]  Stefano Zanero,et al.  Studying Bluetooth Malware Propagation: The BlueBag Project , 2007, IEEE Security & Privacy.

[11]  Tristan Henderson,et al.  CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth , 2005, IEEE Pervasive Comput..

[12]  William Hugh Murray,et al.  The application of epidemiology to computer viruses , 1988, Comput. Secur..

[13]  Mikko Hypponen,et al.  Malware goes mobile. , 2006, Scientific American.

[14]  Stefan Savage,et al.  Inside the Slammer Worm , 2003, IEEE Secur. Priv..

[15]  Madhav V. Marathe,et al.  EpiNet: a simulation framework to study the spread of malware in wireless networks , 2009, SimuTools.

[16]  Stephen Gilmore,et al.  Performance Tools and Applications to Networked Systems , 2004 .

[17]  José Roberto Castilho Piqueira,et al.  Dynamic models for computer viruses , 2008, Comput. Secur..

[18]  Andreas Terzis,et al.  On Using Mobility to Propagate Malware , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[19]  Peng Wu,et al.  General worm propagation model forwireless ad hoc networks , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[20]  Stefan Saroiu,et al.  A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.

[21]  Nathan Eagle,et al.  CRAWDAD dataset mit/reality (v.2005-07-01) , 2005 .

[22]  Bill Broyles Notes , 1907, The Classical Review.

[23]  Yang Xiao,et al.  Worm Propagation Dynamics in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[24]  Guanhua Yan,et al.  Bluetooth Worms: Models, Dynamics, and Defense Implications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[25]  Albert-László Barabási,et al.  Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.

[26]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.

[27]  Giuseppe Serazzi,et al.  Computer virus propagation models , 2004 .

[28]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.