CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks

作者: Feng Li , Yinying Yang , Jie Wu

DOI: 10.1109/INFCOM.2010.5462113

关键词:

摘要: Smartphones are envisioned to provide promising applications and services. At the same time, smartphones also increasingly becoming target of malware. Many emerging malware can utilize proximity devices propagate in a distributed manner, thus remaining unobserved making detections substantially more challenging. Different from existing coping schemes, which either totally centralized or purely distributed, we propose Community-based Proximity Malware Coping scheme, CPMC. CPMC utilizes social community structure, reflects stable controllable granularity security, smartphone-based mobile networks. The scheme integrates short-term components, deal with individual malware, long-term evaluation offer vulnerability towards nodes. A closeness-oriented delegation forwarding combined level quarantine method is proposed as components. These components contain by quickly propagating signature detected into all communities while avoiding unnecessary redundancy. neighbors, based on observed infection history, help users make comprehensive communication decisions. Extensive real- synthetic-trace driven simulation results presented evaluate effectiveness

参考文章(28)
Alex (Sandy) Pentland, Nathan Eagle, CRAWDAD dataset mit/reality (v.2005-07-01) CRAWDAD wireless network data archive. ,(2005) , 10.15783/C71S31
Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas Hengartner, Stephan Eidenbenz, Vincent Vu, Bluetooth worm propagation Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07. pp. 32- 44 ,(2007) , 10.1145/1229285.1229294
Abhijit Bose, Kang G. Shin, On Mobile Viruses Exploiting Messaging and Bluetooth Services 2006 Securecomm and Workshops. pp. 1- 10 ,(2006) , 10.1109/SECCOMW.2006.359562
Cliff Changchun Zou, Weibo Gong, Don Towsley, Worm propagation modeling and analysis under dynamic quarantine defense workshop on rapid malcode. pp. 51- 60 ,(2003) , 10.1145/948187.948197
Elizabeth M. Daly, Mads Haahr, Social network analysis for routing in disconnected delay-tolerant MANETs Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '07. pp. 32- 40 ,(2007) , 10.1145/1288107.1288113
Audun Jøsang, Roslan Ismail, Colin Boyd, A survey of trust and reputation systems for online service provision decision support systems. ,vol. 43, pp. 618- 644 ,(2007) , 10.1016/J.DSS.2005.05.019
George Lawton, On the Trail of the Conficker Worm IEEE Computer. ,vol. 42, pp. 19- 22 ,(2009) , 10.1109/MC.2009.198
D. Chakrabarti, J. Leskovec, C. Faloutsos, S. Madden, C. Guestrin, M. Faloutsos, Information Survival Threshold in Sensor and P2P Networks ieee international conference computer and communications. pp. 1316- 1324 ,(2007) , 10.1109/INFCOM.2007.156
Sonja Buchegger, Jean-Yves Le Boudec, Performance analysis of the CONFIDANT protocol Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '02. pp. 226- 236 ,(2002) , 10.1145/513800.513828