Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062064
|View full text |Cite
|
Sign up to set email alerts
|

A Social Network Based Patching Scheme for Worm Containment in Cellular Networks

Abstract: Abstract-Recently, cellular phone networks have begun allowing third-party applications to run over certain open-API phone operating systems such as Windows Mobile, Iphone and Google's Android platform. However, with this increased openness, the fear of rogue programs written to propagate from one phone to another becomes ever more real. This paper proposes a countermechanism to contain the propagation of a mobile worm at the earliest stage by patching an optimal set of selected phones. The counter-mechanism c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 85 publications
(49 citation statements)
references
References 21 publications
0
49
0
Order By: Relevance
“…Zhu et al [34] proposed a systematic approach to contain MMS worm propagation based on social networks. First, the authors built an undirected weighted graph G to represent the mobiles' social relationships in the cellular network from a real trace.…”
Section: Worm Containment Modelsmentioning
confidence: 99%
“…Zhu et al [34] proposed a systematic approach to contain MMS worm propagation based on social networks. First, the authors built an undirected weighted graph G to represent the mobiles' social relationships in the cellular network from a real trace.…”
Section: Worm Containment Modelsmentioning
confidence: 99%
“…In [25], Xie et al studied the feasibility of leveraging the existing P2P overlay structure for distributing automated security patches to vulnerable machines and examined two approaches. Zhu et al [26] proposed a graph-partitioning approach to contain the propagation of a mobile worm in the context of cellular networks. The proposed methodology was shown to effectively limit the spread of MMS and SMS based worms.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, 182 DINH AND THAI communities within the World Wide Web may correspond to sets of webpages on related topics; communities within mobile networks may correspond to sets of friends or colleagues; in computer networks communities may correspond to users in is peer-to-peer traffic or botnet farms [31]. Detecting this special substructure is also extremely useful in deriving social-based applications such as forwarding and routing strategies in communication networks [12,21,26], Sybil defense [28,30], worm containment on cellular networks [26,32], and sensor programming [27].…”
Section: Introductionmentioning
confidence: 99%