Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism

Both in traditional social network and in mobile network environment, the worm is a serious threat, and this threat is growing all the time. Mobile smartphones generally promote the development of mobile network. The traditional antivirus technologies have become powerless when facing mobile network...

Full description

Saved in:
Bibliographic Details
Main Authors: Meng Wang, Zhide Chen, Li Xu, Huan Zhan
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2014/746803
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832555466059677696
author Meng Wang
Zhide Chen
Li Xu
Huan Zhan
author_facet Meng Wang
Zhide Chen
Li Xu
Huan Zhan
author_sort Meng Wang
collection DOAJ
description Both in traditional social network and in mobile network environment, the worm is a serious threat, and this threat is growing all the time. Mobile smartphones generally promote the development of mobile network. The traditional antivirus technologies have become powerless when facing mobile networks. The development of benign worms, especially active benign worms and passive benign worms, has become a new network security measure. In this paper, we focused on the spread of worm in mobile environment and proposed the benign worm control and repair mechanism. The control process of mobile benign worms is divided into two stages: the first stage is rapid repair control, which uses active benign worm to deal with malicious worm in the mobile network; when the network is relatively stable, it enters the second stage of postrepair and uses passive mode to optimize the environment for the purpose of controlling the mobile network. Considering whether the existence of benign worm, we simplified the model and analyzed the four situations. Finally, we use simulation to verify the model. This control mechanism for benign worm propagation is of guiding significance to control the network security.
format Article
id doaj-art-59e60cc5cc6d455e8ca7be59c4e886f3
institution Kabale University
issn 1110-757X
1687-0042
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-59e60cc5cc6d455e8ca7be59c4e886f32025-02-03T05:48:09ZengWileyJournal of Applied Mathematics1110-757X1687-00422014-01-01201410.1155/2014/746803746803Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing MechanismMeng Wang0Zhide Chen1Li Xu2Huan Zhan3Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, ChinaKey Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, ChinaKey Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, ChinaKey Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, ChinaBoth in traditional social network and in mobile network environment, the worm is a serious threat, and this threat is growing all the time. Mobile smartphones generally promote the development of mobile network. The traditional antivirus technologies have become powerless when facing mobile networks. The development of benign worms, especially active benign worms and passive benign worms, has become a new network security measure. In this paper, we focused on the spread of worm in mobile environment and proposed the benign worm control and repair mechanism. The control process of mobile benign worms is divided into two stages: the first stage is rapid repair control, which uses active benign worm to deal with malicious worm in the mobile network; when the network is relatively stable, it enters the second stage of postrepair and uses passive mode to optimize the environment for the purpose of controlling the mobile network. Considering whether the existence of benign worm, we simplified the model and analyzed the four situations. Finally, we use simulation to verify the model. This control mechanism for benign worm propagation is of guiding significance to control the network security.http://dx.doi.org/10.1155/2014/746803
spellingShingle Meng Wang
Zhide Chen
Li Xu
Huan Zhan
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
Journal of Applied Mathematics
title Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
title_full Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
title_fullStr Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
title_full_unstemmed Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
title_short Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
title_sort spread and control of mobile benign worm based on two stage repairing mechanism
url http://dx.doi.org/10.1155/2014/746803
work_keys_str_mv AT mengwang spreadandcontrolofmobilebenignwormbasedontwostagerepairingmechanism
AT zhidechen spreadandcontrolofmobilebenignwormbasedontwostagerepairingmechanism
AT lixu spreadandcontrolofmobilebenignwormbasedontwostagerepairingmechanism
AT huanzhan spreadandcontrolofmobilebenignwormbasedontwostagerepairingmechanism