2011 IEEE International Parallel &Amp; Distributed Processing Symposium 2011
DOI: 10.1109/ipdps.2011.77
|View full text |Cite
|
Sign up to set email alerts
|

High Performance Scalable and Expressive Modeling Environment to Study Mobile Malware in Large Dynamic Networks

Abstract: Advances in computing and communication technologies are blurring the distinction between today's PCs and mobile phones. With expected smart phones sales to skyrocket, lack of awareness regarding securing them, and access to personal and proprietary information, has resulted in the recent surge of mobile malware. In addition to using traditional social-engineering techniques such as email and file-sharing, malware unique to Bluetooth, Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) message… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 72 publications
0
16
0
Order By: Relevance
“…In light of these issues, we use a synthetic mobility and contact network model constructed using a first-principles based approach (Eubank et al 2004;Barrett et al 2009)-this involves detailed activity modeling in large urban regions, and will be referred to as ABM in the rest of the paper. This approach integrates over a dozen public and commercial datasets, and involves the following steps (see Barrett et al 2009;Channakeshava et al 2011;Channakeshava et al 2009 for more details): (i) Create a synthetic urban population using several databases from commercial and public sources, while preserving their privacy and maintaining statistical indistinguishability; (ii) Use activity templates of individuals to create the activity-based mobility models. This generates the social network for individuals using the US census, survey data and time-use surveys; (iii) Assign detailed route plans to individuals based on the locations where activities are performed and the road network that connects the locations; (iv) Construct detailed movement patterns using a cellular automata based micro-simulation for individuals over the transportation infrastructure; and (v) Construct the Bluetooth proximity network using a sub-location model.…”
Section: In Context Synthetic Mobility and Socio-communication Networmentioning
confidence: 99%
See 2 more Smart Citations
“…In light of these issues, we use a synthetic mobility and contact network model constructed using a first-principles based approach (Eubank et al 2004;Barrett et al 2009)-this involves detailed activity modeling in large urban regions, and will be referred to as ABM in the rest of the paper. This approach integrates over a dozen public and commercial datasets, and involves the following steps (see Barrett et al 2009;Channakeshava et al 2011;Channakeshava et al 2009 for more details): (i) Create a synthetic urban population using several databases from commercial and public sources, while preserving their privacy and maintaining statistical indistinguishability; (ii) Use activity templates of individuals to create the activity-based mobility models. This generates the social network for individuals using the US census, survey data and time-use surveys; (iii) Assign detailed route plans to individuals based on the locations where activities are performed and the road network that connects the locations; (iv) Construct detailed movement patterns using a cellular automata based micro-simulation for individuals over the transportation infrastructure; and (v) Construct the Bluetooth proximity network using a sub-location model.…”
Section: In Context Synthetic Mobility and Socio-communication Networmentioning
confidence: 99%
“…EpiCure (Channakeshava et al 2011) builds on EpiNet, and is designed specifically to work on commodity cluster architectures. It runs extremely fast for realistic instances that involve: (i) large time-varying networks consisting of millions of heterogeneous individuals with time varying interaction neighborhoods, (ii) dynamic interactions between the propagation of the malware, individual behavior, and exogenous interventions, and (iii) large number of replicated runs necessary for statistically sound estimates of malware spread dynamics.…”
Section: Hpc Framework For Malware Simulation: Epicurementioning
confidence: 99%
See 1 more Smart Citation
“…It is found that the virus will break out if the market share of intelligent mobile devices exceeds a certain threshold [8]. Some method has been put forward to address the problem of mobile phone virus [9][10][11]. But the mobility of smart devices can greatly increase the speed of virus propagation even if most nodes in the network remain still.…”
Section: Introductionmentioning
confidence: 99%
“…In a similar work in [7], these inter-dependencies are further studied which show failures in one infrastructure are cascaded over to other infrastructures in non-intuitive ways. In [20], the network produced by Dymenson has been used for studying malware spread, and the impact of realistic network topologies. The diversity of these applications illustrates the power and flexibility of our approach.…”
mentioning
confidence: 99%