TY - GEN
T1 - Closing the Pandora's box
T2 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2012
AU - Potharaju, Rahul
AU - Hoque, Endadul
AU - Nita-Rotaru, Cristina
AU - Sarkar, Saswati
AU - Venkatesh, Santosh S.
PY - 2012
Y1 - 2012
N2 - The openness of the Android operating system increased the number of applications developed, but it also introduced a new propagation vector for mobile malware. We model the propagation of mobile malware using epidemiology theory and study the problem as a function of the underlying mobility models. We define the optimal approach to heal an infected system with the help of a set of static healers that distribute patches, as the T-COVER problem and show that it is NP-HARD. We then propose two families of healer protocols that trade-off time recovery and energy consumed by sending patches. The first one uses randomization to ensure a small recovery time but may result in healers sending more patches than needed. The second one uses system feedback to optimize energy consumed by sending patches, but it may result in a larger recovery time. We show through simulations using the NS-3 simulator that despite lacking knowledge of the future, our protocols obtain a recovery time within a 10x bound of the oracle solution that knows the arrival time of the infected nodes.
AB - The openness of the Android operating system increased the number of applications developed, but it also introduced a new propagation vector for mobile malware. We model the propagation of mobile malware using epidemiology theory and study the problem as a function of the underlying mobility models. We define the optimal approach to heal an infected system with the help of a set of static healers that distribute patches, as the T-COVER problem and show that it is NP-HARD. We then propose two families of healer protocols that trade-off time recovery and energy consumed by sending patches. The first one uses randomization to ensure a small recovery time but may result in healers sending more patches than needed. The second one uses system feedback to optimize energy consumed by sending patches, but it may result in a larger recovery time. We show through simulations using the NS-3 simulator that despite lacking knowledge of the future, our protocols obtain a recovery time within a 10x bound of the oracle solution that knows the arrival time of the infected nodes.
UR - http://www.scopus.com/inward/record.url?scp=84877657842&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84877657842&partnerID=8YFLogxK
U2 - 10.1109/MASS.2012.6502518
DO - 10.1109/MASS.2012.6502518
M3 - Conference contribution
AN - SCOPUS:84877657842
SN - 9781467324335
T3 - MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
SP - 200
EP - 208
BT - MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
Y2 - 8 October 2012 through 11 October 2012
ER -