CC 2 : Defending Hybrid Worm on Mobile Networks with Two‐Dimensional Circulation Control

As the hybrid worm can propagate by both personal social interactions and wireless communications, it has been identified as one of the most severe threats to the mobile Internet. This problem is expected to become worse with the boom of social applications and mobile services. In this work, we stud...

Full description

Saved in:
Bibliographic Details
Published inComplexity (New York, N.Y.) Vol. 2019; no. 1
Main Authors Yang, Hailu, Chen, Deyun, Sun, Guanglu, Ding, Xiaoyu, Xin, Yu
Format Journal Article
LanguageEnglish
Published 01.01.2019
Online AccessGet full text

Cover

Loading…
Abstract As the hybrid worm can propagate by both personal social interactions and wireless communications, it has been identified as one of the most severe threats to the mobile Internet. This problem is expected to become worse with the boom of social applications and mobile services. In this work, we study the propagation dynamics of hybrid worms and propose a systematic countermeasure. The system maintains a set of community structure which describes the high‐speed infection zone of worms and contains worm propagation by distributing the worm signature to the guard nodes selected from the periphery of each community. For those nodes that are geographically close but located in different communities , we evaluate the communication security between them based on the observed infection history and limit communications between insecure ones to avoid the worm spreading across communities. We also design an efficient worm signature forwarding strategy that enables most nodes in the network to reach an immune state before being infected by the worm. Extensive real‐trace driven simulations verify the feasibility and effectiveness of the proposed methods.
AbstractList As the hybrid worm can propagate by both personal social interactions and wireless communications, it has been identified as one of the most severe threats to the mobile Internet. This problem is expected to become worse with the boom of social applications and mobile services. In this work, we study the propagation dynamics of hybrid worms and propose a systematic countermeasure. The system maintains a set of community structure which describes the high‐speed infection zone of worms and contains worm propagation by distributing the worm signature to the guard nodes selected from the periphery of each community. For those nodes that are geographically close but located in different communities , we evaluate the communication security between them based on the observed infection history and limit communications between insecure ones to avoid the worm spreading across communities. We also design an efficient worm signature forwarding strategy that enables most nodes in the network to reach an immune state before being infected by the worm. Extensive real‐trace driven simulations verify the feasibility and effectiveness of the proposed methods.
Author Chen, Deyun
Ding, Xiaoyu
Sun, Guanglu
Yang, Hailu
Xin, Yu
Author_xml – sequence: 1
  givenname: Hailu
  orcidid: 0000-0002-7774-0520
  surname: Yang
  fullname: Yang, Hailu
– sequence: 2
  givenname: Deyun
  orcidid: 0000-0002-5176-7725
  surname: Chen
  fullname: Chen, Deyun
– sequence: 3
  givenname: Guanglu
  orcidid: 0000-0003-2589-1164
  surname: Sun
  fullname: Sun, Guanglu
– sequence: 4
  givenname: Xiaoyu
  orcidid: 0000-0002-8698-0374
  surname: Ding
  fullname: Ding, Xiaoyu
– sequence: 5
  givenname: Yu
  orcidid: 0000-0001-5307-2882
  surname: Xin
  fullname: Xin, Yu
BookMark eNotkEFOwzAURC1UJNrCjgP4AIT6x06csEMpUKQCm0hIbCLH-QFDaiM7KOqOI3BGTkIiupp5m5HmLcjMOouEnAO7BEiSVcwgX-UskQmHIzIHlucRS-J0NnWZRrHM5AlZhPDOGMtTLufkpShoTK_oGlu0jbGvdLOvvWnos_M76ix9cLXpkD5iPzj_Eehg-jdaDu73-2dtdmiDcVZ1tDBef3WqH4kWzvbedafkuFVdwLNDLkl5e1MWm2j7dHdfXG8jnTGItASdKwEo04QzLdNaAJdM14Knoqk1z1qtMhyvAQIKKdTIQmGrQDY6FnxJLv5ntXcheGyrT292yu8rYNWkpZq0VAct_A-Hv1dN
CitedBy_id crossref_primary_10_1109_TMC_2020_3026342
crossref_primary_10_1109_TIFS_2023_3246765
Cites_doi 10.1145/1314389.1314402
10.1007/978-3-540-74853-3_24
10.1109/access.2016.2551199
10.1109/INFCOM.2010.5462113
10.1109/lcomm.2010.01.100830
10.1016/j.physa.2016.10.014
10.1145/1179542.1179545
10.1109/MILCOM.2016.7795374
10.1016/j.comnet.2014.09.004
10.1016/j.physa.2008.12.021
10.1109/tdsc.2007.1001
10.1109/tmc.2012.29
10.1155/2018/5024327
10.1145/1374618.1374640
10.1109/tifs.2016.2594130
10.1103/physreve.76.036106
10.1145/1378600.1378626
10.1126/science.1167053
10.1109/tmc.2008.115
10.1109/INFCOM.2009.5062067
10.1145/2501654.2501657
10.1109/surv.2013.070813.00214
10.1145/1080793.1080806
10.1073/pnas.0601602103
10.1109/tits.2018.2807358
10.1109/surv.2013.100913.00195
10.1109/INFCOM.2009.5062064
10.1109/tmc.2014.2375822
10.1109/tmc.2008.129
10.1109/cc.2015.7188533
10.1109/INFCOM.2013.6566734
10.1371/journal.pone.0012948
10.1145/3284748
10.1109/tnet.2017.2708090
10.1109/tifs.2018.2885254
10.1371/journal.pone.0137858
10.1109/tpds.2014.2370031
10.1109/MILCOM.2016.7795377
10.1109/tsipn.2017.2731123
10.1109/INFCOM.2007.211
10.1088/1367-2630/12/10/103018
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1155/2019/9057531
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
Mathematics
EISSN 1099-0526
Editor Baños, Raúl
Editor_xml – sequence: 1
  givenname: Raúl
  surname: Baños
  fullname: Baños, Raúl
ExternalDocumentID 10_1155_2019_9057531
GroupedDBID .3N
.DC
.GA
.Y3
05W
0R~
10A
1L6
1OC
24P
31~
33P
3R3
3SF
3V.
3WU
4.4
4ZD
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8FE
8FG
8G5
8UM
930
A03
AAESR
AAEVG
AAFWJ
AAHHS
AAJEY
AAONW
AAYXX
ABCQN
ABEML
ABIJN
ABPVW
ABUWG
ACBWZ
ACCFJ
ACSCC
ACXQS
ADBBV
ADIZJ
ADZOD
AEEZP
AEIMD
AENEX
AEQDE
AFBPY
AFKRA
AFPKN
AFZJQ
AIWBW
AJBDE
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARAPS
ASPBG
ATUGU
AVWKF
AZBYB
AZFZN
AZQEC
AZVAB
BAFTC
BCNDV
BDRZF
BENPR
BFHJK
BGLVJ
BHBCM
BNHUX
BPHCQ
BROTX
BRXPI
BY8
CCPQU
CITATION
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DU5
DWQXO
EBD
EBS
EJD
F00
F01
F04
F5P
FEDTE
G-S
G.N
GNP
GNUQQ
GODZA
GROUPED_DOAJ
GUQSH
H.T
H.X
H13
HBH
HCIFZ
HF~
HHY
HVGLF
HZ~
IAO
ITC
IX1
J0M
JPC
K6V
K7-
KQQ
LAW
LC2
LC3
LH4
LP6
LP7
LW6
M2O
MK4
N04
N05
N9A
NF~
NNB
O66
O9-
OIG
OK1
P2P
P2W
P2X
P4D
P62
PQQKQ
PROAC
Q.N
Q11
QB0
QRW
R.K
RHX
ROL
RWI
RX1
RYL
SUPJJ
TUS
V2E
W8V
W99
WBKPD
WIH
WQJ
WRC
WYUIH
XBAML
XG1
XPP
XSW
XV2
~IA
~WT
ID FETCH-LOGICAL-c801-c71c9a41e76530c76b41370cb4364dbc38fca8e2011e1e474afca4aefa17dc243
IEDL.DBID RHX
ISSN 1076-2787
IngestDate Fri Aug 23 04:17:14 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c801-c71c9a41e76530c76b41370cb4364dbc38fca8e2011e1e474afca4aefa17dc243
ORCID 0000-0002-7774-0520
0000-0002-5176-7725
0000-0002-8698-0374
0000-0001-5307-2882
0000-0003-2589-1164
ParticipantIDs crossref_primary_10_1155_2019_9057531
PublicationCentury 2000
PublicationDate 2019-01-00
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – month: 01
  year: 2019
  text: 2019-01-00
PublicationDecade 2010
PublicationTitle Complexity (New York, N.Y.)
PublicationYear 2019
References Daley D. J. (e_1_2_11_33_2) 2001
e_1_2_11_31_2
e_1_2_11_30_2
e_1_2_11_13_2
e_1_2_11_35_2
e_1_2_11_12_2
e_1_2_11_34_2
e_1_2_11_11_2
e_1_2_11_10_2
e_1_2_11_32_2
e_1_2_11_6_2
e_1_2_11_28_2
e_1_2_11_5_2
e_1_2_11_27_2
e_1_2_11_4_2
e_1_2_11_26_2
e_1_2_11_3_2
e_1_2_11_25_2
e_1_2_11_2_2
e_1_2_11_1_2
e_1_2_11_29_2
e_1_2_11_20_2
e_1_2_11_24_2
e_1_2_11_9_2
e_1_2_11_23_2
e_1_2_11_40_2
e_1_2_11_8_2
e_1_2_11_22_2
e_1_2_11_41_2
e_1_2_11_7_2
e_1_2_11_21_2
e_1_2_11_42_2
e_1_2_11_17_2
e_1_2_11_16_2
e_1_2_11_15_2
e_1_2_11_14_2
e_1_2_11_36_2
e_1_2_11_37_2
e_1_2_11_19_2
e_1_2_11_38_2
e_1_2_11_18_2
e_1_2_11_39_2
References_xml – ident: e_1_2_11_25_2
  doi: 10.1145/1314389.1314402
– ident: e_1_2_11_17_2
  doi: 10.1007/978-3-540-74853-3_24
– ident: e_1_2_11_20_2
  doi: 10.1109/access.2016.2551199
– ident: e_1_2_11_5_2
  doi: 10.1109/INFCOM.2010.5462113
– ident: e_1_2_11_2_2
  doi: 10.1109/lcomm.2010.01.100830
– ident: e_1_2_11_30_2
  doi: 10.1016/j.physa.2016.10.014
– ident: e_1_2_11_12_2
  doi: 10.1145/1179542.1179545
– ident: e_1_2_11_21_2
  doi: 10.1109/MILCOM.2016.7795374
– ident: e_1_2_11_31_2
  doi: 10.1016/j.comnet.2014.09.004
– ident: e_1_2_11_41_2
  doi: 10.1016/j.physa.2008.12.021
– ident: e_1_2_11_11_2
  doi: 10.1109/tdsc.2007.1001
– ident: e_1_2_11_18_2
  doi: 10.1109/tmc.2012.29
– ident: e_1_2_11_3_2
  doi: 10.1155/2018/5024327
– ident: e_1_2_11_16_2
  doi: 10.1145/1374618.1374640
– ident: e_1_2_11_19_2
  doi: 10.1109/tifs.2016.2594130
– ident: e_1_2_11_36_2
  doi: 10.1103/physreve.76.036106
– ident: e_1_2_11_26_2
  doi: 10.1145/1378600.1378626
– ident: e_1_2_11_39_2
  doi: 10.1126/science.1167053
– ident: e_1_2_11_34_2
  doi: 10.1109/tmc.2008.115
– ident: e_1_2_11_4_2
  doi: 10.1109/INFCOM.2009.5062067
– ident: e_1_2_11_35_2
  doi: 10.1145/2501654.2501657
– ident: e_1_2_11_1_2
  doi: 10.1109/surv.2013.070813.00214
– ident: e_1_2_11_14_2
  doi: 10.1145/1080793.1080806
– ident: e_1_2_11_37_2
  doi: 10.1073/pnas.0601602103
– ident: e_1_2_11_23_2
  doi: 10.1109/tits.2018.2807358
– ident: e_1_2_11_6_2
  doi: 10.1109/surv.2013.100913.00195
– ident: e_1_2_11_8_2
  doi: 10.1109/INFCOM.2009.5062064
– ident: e_1_2_11_22_2
  doi: 10.1109/tmc.2014.2375822
– ident: e_1_2_11_13_2
  doi: 10.1109/tmc.2008.129
– volume-title: Epidemic Modelling: An Introduction
  year: 2001
  ident: e_1_2_11_33_2
  contributor:
    fullname: Daley D. J.
– ident: e_1_2_11_32_2
  doi: 10.1109/cc.2015.7188533
– ident: e_1_2_11_42_2
  doi: 10.1109/INFCOM.2013.6566734
– ident: e_1_2_11_38_2
  doi: 10.1371/journal.pone.0012948
– ident: e_1_2_11_24_2
  doi: 10.1145/3284748
– ident: e_1_2_11_9_2
  doi: 10.1109/tnet.2017.2708090
– ident: e_1_2_11_27_2
  doi: 10.1109/tifs.2018.2885254
– ident: e_1_2_11_28_2
  doi: 10.1371/journal.pone.0137858
– ident: e_1_2_11_29_2
  doi: 10.1109/tpds.2014.2370031
– ident: e_1_2_11_15_2
  doi: 10.1109/MILCOM.2016.7795377
– ident: e_1_2_11_10_2
  doi: 10.1109/tsipn.2017.2731123
– ident: e_1_2_11_7_2
  doi: 10.1109/INFCOM.2007.211
– ident: e_1_2_11_40_2
  doi: 10.1088/1367-2630/12/10/103018
SSID ssj0009637
Score 2.179396
Snippet As the hybrid worm can propagate by both personal social interactions and wireless communications, it has been identified as one of the most severe threats to...
SourceID crossref
SourceType Aggregation Database
Title CC 2 : Defending Hybrid Worm on Mobile Networks with Two‐Dimensional Circulation Control
Volume 2019
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELWgEwyIFhCf1Q0gwWCRj4udsKGUKkJqB1RExRLZji2xJKgtQmz8BH4jvwQ7SWnFxGjJXu5svXvnu3eEnBtEZV0b0wI1p1iYgCaBEpQLbkIUFnC1y0OOxix7xPtpNF0VyP75wbdgZ9m5n1wnLqxw7dKbMXP3-CGbrqR1Wa2MaXkMo4G9f8vy9j9n14BnDUGGu2SnDf3gtvFVl2zoske2R7-6qfMe6bZPbQ6XrR701R55TlMI4AYG2ui6BwWyD9dnBU823oSqhFEl7duGcVPRPQeXW4XJe_X9-TVw4v2N8AakLzPVDuuCtKlQ3yeT4d0kzWg7EoEqCyVUcV8lAn3NWRR6ijNpMYh7SmLIsJAqjI0SsXagrn2NHIVdo9BG-LxQAYYHpFNWpT4kIAvpCSWESDxjSR0Tpkgiw9DoMI4QgyNysTRX_toIX-Q1YYii3Jk1b816_M99J2TLLZvsxSnpLGZv-szi-UL2ax7cr536A9kgmw8
link.rule.ids 315,783,787,866,867,27936,27937
linkProvider Hindawi Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CC+2+%3A+Defending+Hybrid+Worm+on+Mobile+Networks+with+Two%E2%80%90Dimensional+Circulation+Control&rft.jtitle=Complexity+%28New+York%2C+N.Y.%29&rft.au=Yang%2C+Hailu&rft.au=Chen%2C+Deyun&rft.au=Sun%2C+Guanglu&rft.au=Ding%2C+Xiaoyu&rft.date=2019-01-01&rft.issn=1076-2787&rft.eissn=1099-0526&rft.volume=2019&rft.issue=1&rft_id=info:doi/10.1155%2F2019%2F9057531&rft.externalDBID=n%2Fa&rft.externalDocID=10_1155_2019_9057531
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1076-2787&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1076-2787&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1076-2787&client=summon