Table of Contents Author Guidelines Submit a Manuscript
Abstract and Applied Analysis
Volume 2014, Article ID 623436, 10 pages
http://dx.doi.org/10.1155/2014/623436
Research Article

Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection

1Instituto Universitario de Matemática Multidisciplinar, Universitat Politècnica de València, 46022 Valencia, Spain
2Departamento de Estadstica e Investigación Operativa, Universitat de València, 46100 Valencia, Spain

Received 2 August 2014; Accepted 22 September 2014; Published 28 October 2014

Academic Editor: Jinde Cao

Copyright © 2014 Juan Alegre-Sanahuja et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. http://www.malgenomeproject.org/.
  2. Y. Zhou and X. Jiang, “Dissecting android malware: characterization and evolution,” in Proceedings of the 33rd IEEE Symposium on Security and Privacy, pp. 95–109, San Francisco, Calif, USA, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. “Gartner Smart Phone Marketshare 2013 Q2,” http://www.gartner.com/newsroom/id/2573415.
  4. F. di Cerbo, A. Girardello, F. Michahelles, and S. Voronkova, “Detection of malicious applications on android OS,” in Computational Forensics, S. Sako, K. Franke, and S. Saitoh, Eds., vol. 6540 of Lecture Notes in Computer Science, pp. 138–149, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  5. T. Isohara, K. Takemori, and A. Kubota, “Kernel-based behavior analysis for android malware detection,” in Proceedings of the 7th International Conference on Computational Intelligence and Security (CIS '11), pp. 1011–1015, Hainan, China, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, ““Andromaly”: a behavioral malware detection framework for android devices,” Journal of Intelligent Information Systems, vol. 38, no. 1, pp. 161–190, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Bose and K. G. Shin, “Agent-based modeling of malware dynamics in heterogeneous environments,” Security and Communication Networks, vol. 6, no. 12, pp. 1576–1589, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. J. W. Mickens and B. D. Noble, “Modeling epidemic spreading in mobile environments,” in Proceedings of the 4th ACM workshop on Wireless security (WiSe '05), pp. 77–86, Cologne, Germany, 2005. View at Publisher · View at Google Scholar
  9. K. Ramachandran and B. Sikdar, “Modeling malware propagation in networks of smart cell phones with spatial dynamics,” in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 2516–2520, Anchorage, Alaska, USA, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. P. Wang, M. C. González, C. A. Hidalgo, and A.-L. Barabasi, “Understanding the spreading patterns of mobile phone viruses,” Science, vol. 324, no. 5930, pp. 1071–1076, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. “Android (operating system),” http://en.wikipedia.org/wiki/Android_(operating_system).
  12. C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. Méhes, “Can you infect me now?: Malware propagation in mobile phone networks,” in Proceedings of the ACM Workshop on Recurring Malcode (WORM '07), pp. 61–68, Alexandria, Va, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. S. M. Patterson, Contrary to what you've heard, Android is almost impenetrable to malware, 2013, http://qz.com/131436/contrary-to-what-youve-heard-android-is-almost-impenetrable-to-malware/.
  14. http://en.wikipedia.org/wiki/Valencian_Community.
  15. J. Alegre, J.-C. Cortés, F.-J. Santonja, and R.-J. Villanueva, “Quantifying the behaviour of the actors in the spread of Android malware infection,” in Mathematical Modeling in Social Sciences and Engineering, Chapter 10, pp. 101–112, Nova Science Publishers, New York, NY, USA, 2013. View at Google Scholar
  16. https://play.google.com/store.
  17. http://www.getjar.com/.
  18. T. T. Ahonen and A. Moore, Smartphone Penetration Rates by Country! We Have Good Data (Finally), 2011, http://communities-dominate.blogs.com/brands/2011/12/smartphone-penetration-rates-by-country-we-have-good-data-finally.html.
  19. A. Mylonas, A. Kastania, and D. Gritzalis, “Delegate the smartphone user? Security awareness in smartphone platforms,” Computers and Security, vol. 34, pp. 47–66, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. Webinar: X-Ray Results- Mobile Device Vulnerabilities, Duo Security, 2012, http://www.duosecurity.com/.
  21. A. Hoare, D. G. Regan, and D. P. Wilson, “Sampling and sensitivity analyses tools (SaSAT) for computational modelling,” Theoretical Biology and Medical Modelling, vol. 5, article 4, 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. Department of Homeland Security and Federal Bureau of Investigation, (U//FOUO) DHS-FBI Bulletin: Threats to Mobile Devices Using the Android Operating System, 2013, http://publicintelligence.net/dhs-fbi-android-threats/.