Can you infect me now?: malware propagation in mobile phone networks

  • Authors:
  • Chris Fleizach;Michael Liljenstam;Per Johansson;Geoffrey M. Voelker;Andras Mehes

  • Affiliations:
  • University of California: San Diego, San Diego, CA;Ericsson, Stockholm, Sweden;University of California: San Diego, San Diego, CA;University of California: San Diego, San Diego, CA;Ericsson, Stockholm, Sweden

  • Venue:
  • Proceedings of the 2007 ACM workshop on Recurring malcode
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we evaluate the effects of malware propagating usingcommunication services in mobile phone networks. Although self-propagating malware is well understood in the Internet, mobile phone networks have very different characteristics in terms of topologies, services, provisioning and capacity, devices, and communication patterns. To investigate malware in this new environment, we have developed an event-driver simulator that captures the characteristics and constraints of mobile phone networks. In particular, the simulator models realistic topologies and provisioned capacities of the network infrastructure, as well as the contactgraphs determined by cell phone address books. We evaluate the speedand severity of random contact worms in mobile phone networks, characterize the denial-of-service effects such worms could have on the network, investigate approaches to accelerate malware propagation, and discuss the implications of defending networks against such attacks.