Containing smartphone worm propagation with an influence maximization algorithm

In recent years, wide attention has been drawn to the problem of containing worm propagation in smartphones. Unlike existing containment models for worm propagation, we study how to prevent worm propagation through the immunization of key nodes (e.g., the top k influential nodes). Thus, we propose a novel containment model based on an influence maximization algorithm. In this model, we introduce a social relation graph to evaluate the influence of nodes and an election mechanism to find the most influential nodes. Finally, this model provides a targeted immunization strategy to disable worm propagation by immunizing the top k influential nodes. The experimental results show that the model not only finds the most influential top k nodes quickly, but also effectively restrains and controls worm propagation.

[1]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[2]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.

[3]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[4]  Masahiro Kimura,et al.  Efficient discovery of influential nodes for SIS models in social networks , 2011, Knowledge and Information Systems.

[5]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[6]  Sencun Zhu,et al.  Designing System-Level Defenses against Cellphone Malware , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.

[7]  Pablo A. Estévez,et al.  Selecting the Most Influential Nodes in Social Networks , 2007, 2007 International Joint Conference on Neural Networks.

[8]  Sencun Zhu,et al.  A systematic approach for cell-phone worm containment , 2008, WWW.

[9]  Geoffrey M. Voelker,et al.  Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.

[10]  P. Coulton,et al.  Mobile phone vulnerabilities: a new generation of malware , 2004, IEEE International Symposium on Consumer Electronics, 2004.

[11]  Weijia Jia,et al.  Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[12]  Jingyu Zhou,et al.  Preference-based mining of top-K influential nodes in social networks , 2014, Future Gener. Comput. Syst..

[13]  Dong Li,et al.  An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.

[14]  Sancheng Peng,et al.  Modeling Malware Propagation in Smartphone Social Networks , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[15]  Jingyu Zhou,et al.  Preference-Based Top-K Influential Nodes Mining in Social Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[16]  William H. Sanders,et al.  Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).

[17]  Ning Zhong,et al.  Network Immunization with Distributed Autonomy-Oriented Entities , 2011, IEEE Transactions on Parallel and Distributed Systems.

[18]  Florian Probst,et al.  Who will lead and who will follow: Identifying Influential Users in Online Social Networks , 2013, Business & Information Systems Engineering.

[19]  Xiaodong Liu,et al.  IMGPU: GPU-Accelerated Influence Maximization in Large-Scale Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[20]  Y. Narahari,et al.  A Shapley Value-Based Approach to Discover Influential Nodes in Social Networks , 2011, IEEE Transactions on Automation Science and Engineering.

[21]  Jiming Liu,et al.  Modeling and predicting the dynamics of mobile virus spread affected by human behavior , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[22]  Michael R. Lyu,et al.  Mining social networks using heat diffusion processes for marketing candidates selection , 2008, CIKM '08.

[23]  Binshan Lin,et al.  Security aspects of mobile phone virus: a critical survey , 2008, Ind. Manag. Data Syst..

[24]  Jiming Liu,et al.  Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.

[25]  Geoffrey M. Voelker,et al.  Defending Mobile Phones from Proximity Malware , 2009, IEEE INFOCOM 2009.

[26]  Masahiro Kimura,et al.  Extracting Influential Nodes for Information Diffusion on a Social Network , 2007, AAAI.

[27]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[28]  Sancheng Peng,et al.  Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones , 2013, J. Comput. Syst. Sci..

[29]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[30]  Yitong Wang,et al.  A Potential-Based Node Selection Strategy for Influence Maximization in a Social Network , 2009, ADMA.

[31]  Min Wu,et al.  Propagation model of smartphone worms based on semi-Markov process and social relationship graph , 2014, Comput. Secur..

[32]  Cecilia Mascolo,et al.  Exploiting temporal complex network metrics in mobile malware containment , 2010, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[33]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[34]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[35]  San Cheng Peng A Survey on Malware Containment Models in Smartphones , 2012 .

[36]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[37]  Sancheng Peng,et al.  Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[38]  Cecilia Mascolo,et al.  STOP: Socio-Temporal Opportunistic Patching of short range mobile malware , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[39]  Yu Wang,et al.  Community-based greedy algorithm for mining top-K influential nodes in mobile social networks , 2010, KDD.

[40]  Kang G. Shin,et al.  Proactive security for mobile messaging networks , 2006, WiSe '06.