• DocumentCode
    2769405
  • Title

    An optimal distributed malware defense system for mobile networks with heterogeneous devices

  • Author

    Li, Yong ; Hui, Pan ; Jin, Depeng ; Su, Li ; Zeng, Lieguang

  • Author_Institution
    Dept. of Electron. Eng., Tsinghua Univ., Beijing, China
  • fYear
    2011
  • fDate
    27-30 June 2011
  • Firstpage
    314
  • Lastpage
    322
  • Abstract
    As malware attacks become more frequent in mobile networks, deploying an efficient defense system to protect against infection and to help the infected nodes to recover is important to contain serious spreading and outbreaks. The technical challenges are that mobile devices are heterogeneous in terms of operating systems, and the malware can infect the targeted system in any opportunistic fashion via local and global connectivity, while the to-be-deployed defense system on the other hand would be usually resource limited. In this paper, we investigate the problem of optimal distribution of content-based signatures of malware to minimize the number of infected nodes, which can help to detect the corresponding malware and to disable further propagation. We model the defense system with realistic assumptions addressing all the above challenges, which have not been addressed in previous analytical work. Based on the proposed framework of optimizing the system welfare utility through the signature allocation, we provide an encounter-based distributed algorithm based on Metropolis sampler. Through extensive simulations with both synthetic and real mobility traces, we show that the distributed algorithm achieves the optimal solution, and performs efficiently in realistic environments.
  • Keywords
    distributed algorithms; invasive software; mobility management (mobile radio); operating systems (computers); telecommunication computing; telecommunication security; Metropolis sampler; content-based signature; encounter-based distributed algorithm; heterogeneous device; mobile network; mobility traces; operating system; optimal distributed malware defense system; signature allocation; Algorithm design and analysis; Distributed algorithms; Greedy algorithms; Malware; Mathematical model; Mobile communication; Mobile computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2011 8th Annual IEEE Communications Society Conference on
  • Conference_Location
    Salt Lake City, UT
  • ISSN
    2155-5486
  • Print_ISBN
    978-1-4577-0094-1
  • Type

    conf

  • DOI
    10.1109/SAHCN.2011.5984913
  • Filename
    5984913