Sciweavers

Share
CORR
2010
Springer

Exploiting Temporal Complex Network Metrics in Mobile Malware Containment

7 years 11 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed models from epidemiology and complex networks to analyse the spread of malware and the effect of patching specific nodes. These approaches have adopted a static view of the mobile networks, i.e., by aggregating all the edges that appear over time, which leads to an approximate representation of the real interactions: instead, these networks are inherently dynamic and the edge appearance and disappearance are highly influenced by the ordering of the human contacts, something which is not captured at all by existing complex network measures. In this paper we first study how the blocking of malware propagation through immunisation of key nodes (even if carefully chosen through static or temporal betweenness centrality metrics) is ineffective: this is due to the richness of alternative paths in these networks. The...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L
Added 14 May 2011
Updated 14 May 2011
Type Journal
Year 2010
Where CORR
Authors John Tang, Cecilia Mascolo, Mirco Musolesi, Vito Latora
Comments (0)
books