Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks

Bluetooth networks are envisioned to provide many promising services and applications. Meanwhile, Bluetooth networks are also increasingly becoming the target of worms. Many emerging worms can utilize the proximity of devices to propagate in a distributed manner, resulting in modeling on worm propagation substantially more challenging. In this paper, we propose an efficient Worm Propagation Modeling scheme, WPM for short. WPM utilizes the two-dimensional (2D) cellular automata to simulate the dynamics of the worm propagation process from a single node to the entire Bluetooth network. The WPM scheme integrates infection factor, which evaluates the spread degree of infected nodes, and resistance factor, which offers resistance evaluation towards susceptible nodes. Moreover, the epidemic state of each node is classified into five types in the WPM scheme, including susceptible, exposed, infected, diagnosed, and recovered. The effectiveness and rationality of the proposed model are validated through extensive simulations.

[1]  Eitan Altman,et al.  Optimal Quarantining of Wireless Malware Through Reception Gain Control , 2012, IEEE Transactions on Automatic Control.

[2]  Guo Jiajia Modeling the SARS Epidemic Considering Self-cure , 2003 .

[3]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[4]  Kang G. Shin,et al.  On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.

[5]  Maziar Nekovee,et al.  Worm epidemics in wireless ad hoc networks , 2007, ArXiv.

[6]  Maziar Nekovee,et al.  The Opportunistic Transmission of Wireless Worms between Mobile Devices , 2008, ArXiv.

[7]  Jeffrey O. Kephart,et al.  Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[8]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[9]  Gao Bao-jun A Heterogeneous Cellular Automata Model for SARS Transmission , 2006 .

[10]  Vasileios Karyotis,et al.  Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis , 2008, Journal of Computer Science and Technology.

[11]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.

[12]  Brian L. Mark,et al.  Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.

[13]  K. Abbas,et al.  MODELING INFECTIOUS DISEASES USING GLOBAL STOCHASTIC CELLULAR AUTOMATA , 2005 .

[14]  Donald F. Towsley,et al.  Code red worm propagation modeling and analysis , 2002, CCS '02.

[15]  Wang Suo-ping A Discrete Probabilistic Model of Malware Propagation , 2010 .

[16]  Jiang Guoping,et al.  Research of malware propagation in complex networks based on 1-D cellular automata , 2009 .

[17]  Margaret Tan,et al.  An Investigation of Bluetooth Security Threats , 2011, 2011 International Conference on Information Science and Applications.

[18]  Ángel Martín del Rey,et al.  Modeling epidemics using cellular automata , 2006, Applied Mathematics and Computation.