Title :
Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors
Author :
Jackson, Jennifer T. ; Creese, Sadie
Author_Institution :
Dept. of Complexity Sci., Univ. of Warwick, Coventry, UK
Abstract :
The growth in the use of Smartphones and other mobile computing devices continues to grow rapidly. As mobile wireless communications become ubiquitous, the networks and systems that depend upon them will become more complex. In parallel with this, the spread of digital viruses and malicious content will be an ever increasing threat within this interconnected paradigm requiring counteracting mechanisms to continuously adapt. Current security solutions for mobile devices remain limited in their ability to protect particularly against zero-day attacks. Understanding the propagation characteristics of malware could provide a means to planning protection strategies, but modeling virus propagation behavior in mobile wireless and peer-to-peer communications devices is still immature. A compartmental-based virus propagation model has been developed for Bluetooth communication networks incorporating wireless technological traits and factors that are known to affect virus propagation including human behaviors, heterogeneous devices, and antivirus measures. The model is novel in the richness of its treatment of human factors alongside the technology factors that could impact spread. A simulation scenario, together with an analysis of the spreading dynamics has been conducted to determine how a Bluetooth virus might spread under different conditions. Although demonstrated through Bluetooth, the approach is applicable to malware propagation in general.
Keywords :
Bluetooth; computer network security; computer viruses; human factors; mobile computing; peer-to-peer computing; smart phones; antivirus measure; compartmental-based virus propagation model; digital virus; heterogeneous bluetooth network; human behaviors; human factors; interconnected network; malicious content; malware propagation; mobile computing devices; mobile wireless communication; parallel computing; peer-to-peer communication; protection strategy planning; smart phone; technology factor; ubiquitous computing; virus propagation behavior modeling; zero-day attack; Bluetooth; Human factors; Mathematical model; Mobile communication; Smart phones; Ubiquitous computing; Viruses (medical); Human factors; invasive software (viruses; pervasive computing; trojan horses); wireless; worms;
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
DOI :
10.1109/TDSC.2012.72