Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014, Article ID 746803, 14 pages
http://dx.doi.org/10.1155/2014/746803
Research Article

Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism

Key Lab of Network Security and Cryptography, School of Mathematics and Computer Sciences, Fujian Normal University, Fuzhou, Fujian 350007, China

Received 29 April 2014; Accepted 21 September 2014; Published 10 November 2014

Academic Editor: Junjie Wei

Copyright © 2014 Meng Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Zhou, Y. Wen, and H. Zhao, “Modeling and analysis of active benign worms and hybrid benign worms containing the spread of worms,” in Proceedings of the 6th International Conference on Networking (ICN '07), p. 65, Martinique, France, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  2. O. Toutonji and S.-M. Yoo, “Passive benign worm propagation modeling with dynamic quarantine defense,” KSII Transactions on Internet and Information Systems, vol. 3, no. 1, pp. 96–107, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. F. Castañeda, E. C. Sezer, and J. Xu, “Worm vs. Worm: Preliminary study of an active counter-attack mechanism,” in Proceedings of the ACM Workshop on Rapid Malcode (WORM '04), pp. 83–93, ACM, October 2004. View at Scopus
  4. F. Cohen, “Computer viruses. Theory and experiments,” Computers and Security, vol. 6, no. 1, pp. 22–35, 1987. View at Publisher · View at Google Scholar · View at Scopus
  5. V. Kostakos, “Experiences with urban deployment of Bluetooth (given at UCSD),” March 2007.
  6. Z. Hui, L. Dong, and G. Zhuo, “An epidemic model of mobile phone virus,” in Proceedings of the 1st International Symposium on Pervasive Computing and Applications (SPCA '06), pp. 1–5, Urumqi, China, August 2006. View at Publisher · View at Google Scholar · View at Scopus
  7. C. Mulliner, G. Vigna, D. Dagon, and W. Lee, “Using labeling to prevent cross-service attacks against smart phones,” in Detection of Intrusions and Malware & Vulnerability Assessment, pp. 91–108, Springer, Berlin, Germany, 2006. View at Google Scholar
  8. S. Qing and W. Wen, “A survey and trends on internet worms,” Computers & Security, vol. 24, no. 4, pp. 334–346, 2005. View at Publisher · View at Google Scholar · View at Scopus
  9. A. Bose and K. G. Shin, “Proactive security for mobile messaging networks,” in Proceedings of the 5th ACM workshop on Wireless security, pp. 95–104, ACM, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. E. Van Ruitenbeek, T. Courtney, W. H. Sanders, and F. Stevens, “Quantifying the effectiveness of mobile phone virus response mechanisms,” in Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '07), pp. 790–799, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. P. Niels, “A virtual honeypot framework,” in Proceedings of the 12th USENIX Security Symposium, vol. 173, San Diego, Calif, USA, August 2004.
  12. O. Laurent, Fighting Internet Worms with Honeypots, 2003, http://www.securityfocus.com/infocus/1740.
  13. X. Zheng, T. Li, and Y. Fang, “Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation,” Journal of Supercomputing, vol. 62, no. 3, pp. 1451–1479, 2012. View at Publisher · View at Google Scholar · View at Scopus