Modeling the Propagation of Mobile Phone Virus under Complex Network

Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively.

[1]  David J. Marchette,et al.  Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction , 2004, Comput. Stat. Data Anal..

[2]  Hui He,et al.  PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform , 2014, Int. J. Distributed Sens. Networks.

[3]  Ravi Kumar,et al.  Structure and evolution of online social networks , 2006, KDD '06.

[4]  Bimal Kumar Mishra,et al.  Dynamic model of worms with vertical transmission in computer network , 2011, Appl. Math. Comput..

[5]  R.W. Thommes,et al.  Modeling Virus Propagation in Peer-to-Peer Networks , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[6]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[7]  Neal Leavitt,et al.  Mobile phones: the next frontier for hackers? , 2005, Computer.

[8]  Stephanie Forrest,et al.  Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[9]  Seungyeop Han,et al.  Analysis of topological characteristics of huge online social networking services , 2007, WWW '07.

[10]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[11]  Hua Yuan,et al.  Network virus-epidemic model with the point-to-group information propagation , 2008, Appl. Math. Comput..

[12]  Cong Jin,et al.  Propagation Model of Mobile Phone Virus Based on Efficiency of Immunization , 2008, 2008 International Conference on MultiMedia and Information Technology.

[13]  Michalis Faloutsos,et al.  Smartphone viruses propagation on heterogeneous composite networks , 2013, 2013 IEEE 2nd Network Science Workshop (NSW).

[14]  Fangwei Wang,et al.  Stability analysis of a SEIQV epidemic model for rapid spreading worms , 2010, Comput. Secur..

[15]  José Roberto Castilho Piqueira,et al.  A modified epidemiological model for computer viruses , 2009, Appl. Math. Comput..

[16]  Albert-László Barabási,et al.  Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.

[17]  Dong Li,et al.  An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.

[18]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[19]  Jeffrey O. Kephart,et al.  Measuring and modeling computer virus prevalence , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[20]  Berni Dwan Mobile Phone Virus: The mobile phone virus , 2004 .

[21]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[22]  Jeffrey O. Kephart,et al.  Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[23]  Lu-Xing Yang,et al.  A novel computer virus model and its dynamics , 2012 .

[24]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[25]  Ge Yu,et al.  Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy , 2012 .

[26]  Donald F. Towsley,et al.  On the performance of Internet worm scanning strategies , 2006, Perform. Evaluation.

[27]  P. Coulton,et al.  Mobile phone vulnerabilities: a new generation of malware , 2004, IEEE International Symposium on Consumer Electronics, 2004.

[28]  W. Fan,et al.  Online social networks—Paradise of computer viruses☆ , 2011 .

[29]  Zhen Jin,et al.  The analysis of an epidemic model on networks , 2011, Appl. Math. Comput..

[30]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[31]  Yasmin B. Kafai,et al.  Understanding Virtual Epidemics: Children’s Folk Conceptions of a Computer Virus , 2008 .