Abstract
Complex network and complex systems research has been proven to have great implications in practice in many scopes including Social Networks, Biology, Disease Propagation, and Information Security. One can use complex network theory to optimize resource locations and optimize actions. Randomly constructed graphs and probabilistic arguments lead to important conclusions with a possible great social and financial influence. Security in online social networks has recently become a major issue for network designers and operators. Being “open” in their nature and offering users the ability to compose and share information, such networks may involuntarily be used as an infection platform by viruses and other kinds of malicious software. This is specifically true for mobile social networks, that allow their users to download millions of applications created by various individual programers, some of which may be malicious or flawed. In order to detect that an application is malicious, monitoring its operation in a real environment for a significant period of time is often required. As the computation and power resources of mobile devices are very limited, a single device can monitor only a limited number of potentially malicious applications locally. In this work, we propose an efficient collaborative monitoring scheme that harnesses the collective resources of many mobile devices, generating a “vaccination”-like effect in the network. We suggest a new local information flooding algorithm called Time-to-Live Probabilistic Propagation (TPP). The algorithm is implemented in any mobile device, periodically monitors one or more applications and reports its conclusions to a small number of other mobile devices, who then propagate this information onward, whereas each message has a predefined “Time-to-Live” (TTL) counter. The algorithm is analyzed, and is shown to outperform the existing state of the art information propagation algorithms, in terms of convergence time as well as network overhead. We then show both analytically and experimentally that implementing the proposed algorithm significantly reduces the number of infected mobile devices. Finally, we analytically prove that the algorithm is tolerant to the presence of adversarial agents that inject false information into the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We assume that interference in the messages’ content, or generation of messages using false identity are impossible, due to, say, the use of cryptographic means.
- 2.
This will later come into effect when messages will be sent between the network’s members, at which case the selection of “an arbitrary network member” can be assumed to be purely random.
- 3.
The intuition behind this assumption is as follows: we aspire that the number of messages each device is asked to send upon discovering a new malicious application is kept to a minimum. As the value of P N is required to be greater than \(\frac{\ln n} {n}\) in order to guarantee connectivity [23], it is safe to assume that \({P}_{N} = O\left (\frac{\ln n} {n}\right )\). Notice that under some assumptions, a connected pseudo-random graph can still be generated, such that \({p}_{N} = O( \frac{1} {n})\) (see for example [21]). However, as we are interested in demonstrating the result for any random graph G(n, p), this lower bound of p N is still mentioned. In addition, we later show that timeout ≈ O(logn). It is also safe to assume that N ≈ Ω(lnn) and that \({P}_{\mathrm{MAX}} \approx O\left ( \frac{1} {\ln n}\right )\). This assumption is later discussed in great details.
- 4.
See Sect. 17.6 for more details.
- 5.
Note that the number of malicious applications does not influence the completion time of algorithm, as monitoring and notification is done in parallel. The number of message, however, grows linearly with the number of malicious applications.
References
Mcafee mobile security report 2008. Tech. rep. (2008). http://www.mcafee.com/us/resources/reports/rp-mobile-security-2008.pdf
Mcafee mobile security report 2009. Tech. rep. (2009). http://www.mcafee.com/us/resources/reports/rp-mobile-security-2009.pdf
Adamic, L.A., Lukose, R.M., Puniyani, A.R., Huberman, B.A.: Search in power-law networks. Phys. Rev. E 64(4), 046,135 (2001). DOI 10.1103/PhysRevE.64.046135
Altshuler, Y., Bruckstein, A.M.: Static and expanding grid coverage with ant robots: Complexity results. Theor. Comput. Sci. 412(35), 4661–4674 (2011)
Altshuler, Y., Yanovsky, V., Bruckstein, A., Wagner, I.: Efficient cooperative search of smart targets using uav swarms. ROBOTICA 26, 551–557 (2008)
Angluin, D., Aspnes, J., Eisenstat, D.: A simple population protocol for fast robust approximate majority. Dist. Comp. 21, 87–102 (2008)
Apap, F., Honig, A., Hershkop, S., Eskin, E., Stolfo, S.: Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. Recent Advances in Intrusion Detection, pp. 36–53. Springer Berlin Heidelberg (2002)
Aspnes, J., Ruppert, E.: An Introduction to Population Protocols. Middleware for Network Eccentric and Mobile Applications, pp. 97–120. Springer Berlin Heidelberg (2009)
Bailey, N.: The Mathematical Theory of Infectious Diseases and its Applications (second edition). Hafner Press (1975)
Barak, B., Halevi, S., Herzberg, A., Naor, D.: Clock synchronization with faults and recoveries (extended abstract). In: PODC ’00: Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing, pp. 133–142. ACM, New York, NY, USA (2000). DOI http://doi.acm.org/10.1145/343477.343534
Batalin, M., Sukhatme, G.: Spreading out: A local approach to multi-robot coverage. In: 6th International IEEE Symposium on Distributed Autonomous Robotics Systems, (IEEE) (2002)
Cagalj, M., Hubaux, J., Enz, C.: Minimum-energy broadcast in all-wireless networks: Np-completness and distribution issues. In: The Annual International Conference on Mobile Computing and Networking (MOBICOM), ACM (Atlanta Georgia) (2002)
Mobile Broadband Growth report: HSPA/HSPA+ operator success stories worldwide, trends, forecasts, GSA (the Global mobile Suppliers Association) (2010)
Castelluccia, C., Jarecki, S., Kim, J., Tsudik, G.: Secure acknowledgement aggregation and multisignatures with limited robustness. Computer Networks 50(10), 1639–1652 (2006)
Choy, M., Singh, A.K.: Efficient fault-tolerant algorithms for distributed resource allocation. ACM Trans. Program. Lang. Syst. 17(3), 535–559 (1995). DOI http://doi.acm.org/10.1145/203095.203101
Chung, F., Lu, L.: The diameter of sparse random graphs. Advances in Applied Mathematics 26, 257–279 (2001)
Crisostomo, S., Barros, J., Bettstetter, C.: Flooding the network: Multipoint relays versus network coding. In: 4th IEEE Intl. Conference on Circuits and Systems for Communications (ICCSC). IEEE (Shanghai, China), pp. 119–124 (2008)
Demers, A., Greene, D., Hauser, C., Irish, W., Larson, J., Shenker, S., Sturgis, H., Swinehart, D., Terry, D.: Epidemic algorithms for replicated database maintenance. In: In Proc. of the Sixth ACM Symposium on Principles of Distributed Computing, (Vancouver, Canada), pp. 1–12 (1987)
D.F. Zucker M. Uematsu, T.K.: Markup-based smartphone user interface using the web browser engine. In: Proceedings XTech. IDEAlliance, Amsterdam, pp. 25–27 (2005)
Dolev, S., Schiller, E., Welch, J.: Random walk for self-stabilizing group communication in ad hoc networks. IEEE Transactions on Mobile Computing, Switzerland 5, 893–905 (2006)
Dolev, S., Tzachar, N.: Spanders: Distributed spanning expanders. In: Proceedings ACM SCS (ACM), Switzerland (2010)
Erdos, P., Renyi, A.: On random graphs. Publ. Math. Debrecen 6, 290–291 (1959)
Erdos, P., Renyi, A.: On the evolution of random graphs. Publications of the Mathematical Institute of the Hungarian Academy of Sciences 5, 17–61 (1960)
Fragouli, C., Widmer, J., Boudec, J.L.: A network coding approach to energy efficient broadcasting: from theory to practice. In: The 25th IEEE International Conference on Computer Communications (INFOCOM2006). IEEE, Barcelona, pp. 1–11 (2006)
Ganesa, D., Krishnamachari, B., Woo, A., Culler, D., Estrin, D., Wicker, S.: An empirical study of epidemic algorithms in large scale multihop wireless networks – technical report ucla/csd-tr 02-0013. Technical report, UCLA Computer Science (2002)
Gemmel, P.: An introduction to threshold cryptography. CryptoBytes, RSA Labs, pp. 7–12 (1997)
GetJar: Getjar statistics (2010)
Golding, R., Long, D., Wilkes, J.: The refdbms distributed bibliographic database system. In: In Proc. of USENIX. USENIX (the advanced computer systems association), Boston MA, pp. 47–62 (1994)
Haas, Z., Halpern, J., Li, L.: Gossip-based ad-hoc routing. IEEE/ACM Transactions of networks 14(3), 479–491 (2006)
Hypponen, M.: Malware goes mobile. Sci. American 295, 70 (2006)
Hypponen, M.: State of cell phone malware in 2007. Technical report FSECURE (2007)
J. Cheng S. Wong, H.Y.S.L.: Smartsiren: Virus detection and alert for smartphones. In: In Proceedings of the Fifth ACM International Conference on Mobile Systems Applications and Services (MOBISYS). ACM, Puerto Rico, pp. 258–271 (2007)
Jacoby, G., Davis, N.: Battery-based intrusion detection. In: Proceedings of the IEEE Global Telecommunications Conference, GLOBECOM04. IEEE, Dallas Texas, vol. 4, pp. 2250–2255 (2004)
Jacquet, P., Laouiti, A., Minet, P., Viennot, L.: Performance analysis of olsr multipoint relay flooding in two ad-hoc wireless network models. technical report 4260. Technical report, INRIA (2001)
Jonasson, J., Schramm, O.: On the cover time of planar graphs. Electron. Comm. Probab. 5, 85–90 (electronic) (2000)
Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: MobiSys ’08: Proceeding of the 6th international conference on Mobile systems, applications, and services, pp. 239–252. ACM, New York, NY, USA (2008). DOI http://doi.acm.org/10.1145/1378600.1378627
Kleinberg, J.: The wireless epidemic. Nature 449, 287–288 (2007)
Koenig, S., Liu, Y.: Terrain coverage with ant robots: A simulation study. In: The International Conference on Autonomous Agents (AGENTS). (ACM), Montreol Canada 600–607 (2001)
Koenig, S., Szymanski, B., Liu, Y.: Efficient and inefficient ant coverage methods. Annals of Mathematics and Artificial Intelligence 31, 41–76 (2001)
Kong, C., Peng, N., Rekleitis, I.: Distributed coverage with multi-robot system. In: IEEE International Conference on Robotics and Automation (ICRA). IEEE Orlando Florida, (2006)
Korf, R.: Real-time heuristic search. Artificial Intelligence 42, 189–211 (1990)
Lim, H., Kim, C.: Multicast tree construction and flooding in wireless ad hoc networks. In: In Proceedings of the ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM). ACM, Bodrum Turkey (2000)
Liu, D., Ning, P., Liu, A., Wang, C., Du, W.K.: Attack-resistant location estimation in wireless sensor networks. ACM Trans. Inf. Syst. Secur. 11(4), 1–39 (2008). DOI http://doi.acm.org/10.1145/1380564.1380570
Lv, Q., Cao, P., Cohen, E., Li, K., Shenker, S.: Search and replication in unstructured peer-to-peer networks. In: ICS ’02: Proceedings of the 16th international conference on Supercomputing, pp. 84–95. ACM, New York, NY, USA (2002). DOI http://doi.acm.org/10.1145/514191.514206
Moskovitch, R., Gus, I., Pluderman, S., Stopel, D., Glezer, C., Shahar, Y., Elovici, Y.: Detection of unknown computer worms activity based on computer behavior using data mining. In: CISDA 2007. IEEE Symposium on Computational Intelligence in Security and Defense Applications. IEEE, Honolulu, HI, USA, pp. 169–177 (2007)
Moskovitch, R., Pluderman, S., Gus, I., Stopel, D., Feher, C., Parmet, Y., Shahar, Y., Elovici, Y.: Host based intrusion detection using machine learning. In: 2007 IEEE Intelligence and Security Informatics. IEEE, ISI, New Jersey, pp. 107–114 (2007)
Mutz, D., Valeur, F., Vigna, G., Kruegel, C.: Anomalous system call detection. ACM Trans. Inf. Syst. Secur. 9(1), 61–93 (2006). DOI http://doi.acm.org/10.1145/1127345.1127348
Narasimha, M., Tsudik, G., Yi, J.H.: On the utility of distributed cryptography in p2p and manets: the case of membership control. In: Proceedings of the 11th IEEE International Conference on Network Protocols. IEEE, Atlanta Georgia, pp. 336–345 (2003)
Nash, D.C., Martin, T.L., Ha, D.S., Hsiao, M.S.: Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. Pervasive Computing and Communications Workshops, IEEE International Conference on. IEEE, PERCOM, Hawaii, 0, 141–145 (2005). DOI http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2005.86
Ni, S., Tseng, Y., Chen, Y., Sheu, J.: The broadcast storm problem in a mobile ad hoc network. In: In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM), Seattle, Washington, pp. 151–162 (1999)
Peng, W., Lu, X.C.: On the reduction of broadcast redundancy in mobile ad hoc networks. In: MobiHoc ’00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing, pp. 129–130. IEEE Press, Piscataway, NJ, USA (2000)
Polycarpou, M., Yang, Y., Passino, K.: A cooperative search framework for distributed agents. In: IEEE International Symposium on Intelligent Control (ISIC), Mexico City, pp. 1–6 (2001)
Qayyum, L., Laouiti, A.: Multipoint relaying for flooding broadcast messages in mobile wireless networks. In: Proceedings of HICSS. IEEE Hawaii, (2002)
Rekleitis, I., Lee-Shuey, V., Newz, A.P., Choset, H.: Limited communication, multi-robot team based coverage. In: IEEE International Conference on Robotics and Automation. IEEE, Barcelona (2004)
van Renesse, R.: Power-aware epidemics. Reliable Distributed Systems, IEEE Symposium on. IEEE Computer Society, Osaka Japan, 0, 358 (2002). DOI http://doi.ieeecomputersociety.org/10.1109/RELDIS.2002.1180210
van Renesse, R., Birman, K.: Scalable management and data mining using astrolabe. In: In Proc. of the First International Workshop on Peer-to-Peer Systems (IPTPS02). Springer, Cambridge MA, (2002)
Sasson, Y., Cavin, D., Schiper, A.: Probabilistic broadcas for flooding in wireless mobile ad-hoc networks. In: Proceedings of IEEE Wireless communication and networks (WCNC). IEEE, New Orleans, Louisiana (2003)
Shevchenko, A.: An overview of mobile device security. Kaspersky Labs, (available at www.viruslist.com/en/analysis?pubid$=$170773606) (2005)
Stojmenovic, I., Seddigh, M., Zunic, J.: Ahbp: An efficient broadcast protocol for mobile ad hoc networks. Journal of Computer Science and Technology 16(2), 114–125 (2001)
Stojmenovic, I., Seddigh, M., Zunic, J.: Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Transactions on Parallel and Distributed Systems 13(1), 14–25 (2002). DOI http://doi.ieeecomputersociety.org/10.1109/71.980024
Stone, L.: Theory of Optimal Search. Academic Press, New York (1975)
Svennebring, J., Koenig, S.: Building terrain-covering ant robots: A feasibility study. Autonomous Robots 16(3), 313–332 (2004)
Vogels, W., van Renesse, R., Birman, K.: The power of epidemics: robust communication for large-scale distributed systems. SIGCOMM Comput. Commun. Rev. 33(1), 131–135 (2003). DOI http://doi.acm.org/10.1145/774763.774784
Wagner, I., Altshuler, Y., Yanovski, V., Bruckstein, A.: Cooperative cleaners: A study in ant robotics. The International Journal of Robotics Research (IJRR) 27(1), 127–151 (2008)
Wang, P., Gonzalez, M., Hidalgo, C., Barabasi, A.: Understanding the spreading patterns of mobile phone viruses. Science 324, 1071–1075 (2009)
Williams, B., Camp, T.: Comparison of broadcasting techniques for mobile ad hoc networks. In: The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing. Lausanne, Switzerland, pp. 9–11 (2002)
Zlot, R., Stentz, A., Dias, M., Thayer, S.: Multi-robot exploration controlled by a market economy. In: Proceedings of the IEEE International Conference on Robotics and Automation. IEEE, Washington DC (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Altshuler, Y., Dolev, S., Elovici, Y. (2012). TTLed Random Walks for Collaborative Monitoring in Mobile and Social Networks. In: Thai, M., Pardalos, P. (eds) Handbook of Optimization in Complex Networks. Springer Optimization and Its Applications(), vol 57. Springer, Boston, MA. https://doi.org/10.1007/978-1-4614-0754-6_17
Download citation
DOI: https://doi.org/10.1007/978-1-4614-0754-6_17
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4614-0753-9
Online ISBN: 978-1-4614-0754-6
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)