A distributed patching scheme for controlling mobile malware infection

Mobile malware has become a serious security challenge in the world. Google Android dominated the global Smart-phone market in 2014. This popularity makes it easier for the attackers to target larger community of devices. In this paper, we study the dynamics of infection propagation of mobile malware over mobile phones. We construct a framework for simulating peer-to-peer malware infection among mobile users in a community such as students in a campus. Also, we propose a distributed patching scheme for controlling and protecting users in a community against rapid propagation of mobile malware. This technique is effective especially in the underdeveloped countries with expensive and limited mobile Internet services. Using our framework, we simulate the infection rate and performance of patching techniques for a campus area. Our simulation results verify that under certain conditions immunization rate (reaching 90% immunization in the community) in our scheme is 3.5 times faster than the classic centralized scheme. Also, using our scheme would reduce infected devices population in the early stages of malware spreading four times faster.

[1]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.

[2]  Marco Conti,et al.  Human mobility models for opportunistic networks , 2011, IEEE Communications Magazine.

[3]  Hee Beng Kuan Tan,et al.  Detection of Mobile Malware in the Wild , 2012, Computer.

[4]  Woei-Jiunn Tsaur,et al.  Mobile Malware Behavioral Analysis and Preventive Strategy Using Ontology , 2010, 2010 IEEE Second International Conference on Social Computing.

[5]  Albert-László Barabási,et al.  Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.

[6]  Dong Li,et al.  An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.

[7]  Asaf Shabtai Malware Detection on Mobile Devices , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[8]  Yonghui Hu,et al.  Cluster Features of Bluetooth Mobile Phone Virus and Research on Strategies of Control & Prevention , 2010, 2010 International Conference on Computational Intelligence and Security.

[9]  Sung-Keun Lee,et al.  Design of effective anti-malware system for mobile industrial devices based on windows CE , 2009, 2009 11th International Conference on Advanced Communication Technology.

[10]  Jiming Liu,et al.  Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.

[11]  Geoffrey M. Voelker,et al.  Defending Mobile Phones from Proximity Malware , 2009, IEEE INFOCOM 2009.

[12]  Deepak Venugopal,et al.  A Malware Signature Extraction and Detection Method Applied to Mobile Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[13]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Prakash Veeraraghavan,et al.  Early virus detection for Windows Mobile , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).