Skip to main content

Spreading Patterns of Mobile Phone Viruses Using Cellular Automata

  • Conference paper
Cellular Automata (ACRI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7495))

Included in the following conference series:

  • 2793 Accesses

Abstract

Major technology progress and evolution of human living standards have led to wide development of mobile telecommunications. Nowadays, classic mobile phones tend to be replaced by more complex devices that show similar abilities to personal computers (PCs), known as smartphones. Rapid spreading of smartphone technology, as well as significant resemblance to PCs, gave rise to the appearance of mobile phone viruses, and the first attacks have already been recorded. In this work, the study of methods for the spreading of mobile phone viruses using Cellular Automata (CAs) is presented. The dependence of spreading patterns on time and on the operating system (OS) market share is examined with the use of a mathematical model designed for the prediction of such future situations. Simulation results are compared to published results based on real communication patterns, proving that the proposed model effectively captures the dynamics of mobile virus spreading.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shih, D.-H., Lin, B., Chiang, H.-S., Shih, M.-H.: Security aspects of mobile phone virus: a critical survey. Industrial Management & Data Systems 108(4), 478–494 (2008)

    Article  Google Scholar 

  2. Hypponen, M.: Malware Goes Mobile. Scientific American 295, 70–77 (2006)

    Article  Google Scholar 

  3. Wang, P., González, M.-C., Hidalgo, C.-A., Barabási, A.-L.: Understanding the Spreading Patterns of Mobile Phone Viruses. SCIENCE 324, 1071–1075 (2009)

    Article  Google Scholar 

  4. Sirakoulis, G.C., Karafyllidis, I., Thanailakis, A.: A cellular automaton model for the effect of population movement on epidemic propagation. Ecological Modeling 133(3), 209–223 (2000)

    Article  Google Scholar 

  5. Ahmed, E., Agiza, H.N.: On modeling epidemics. Including latency, incubation and variable susceptibility. Physica A: Statistical Mechanics and its Applications 253, 247–352 (1998)

    Article  Google Scholar 

  6. Caldarelli, G.: Scale-Free Networks Complex Webs in Nature and Technology. Oxford Uni. Press (2007)

    Google Scholar 

  7. Albert, R., Jeong, H., Barabási, A.-L.: Error and Attack Tolerance of Complex Networks. Nature 406, 378–382 (2000)

    Article  Google Scholar 

  8. Cohen, R., Erez, K., ben-Avraham, D., Havlin, S.: Resilience of The Internet to Random Breakdowns. Phys. Rev. Lett. 85, 4626–4628 (2000)

    Article  Google Scholar 

  9. Callaway, D.S., Newman, M.E.J., Strogatz, S.H., Watts, D.J.: Network Robustness and Fragility: Percolation on Random Graphs. Physical Review Letters 85(25), 5468–5471 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vourkas, I., Michail, D., Sirakoulis, G.C. (2012). Spreading Patterns of Mobile Phone Viruses Using Cellular Automata. In: Sirakoulis, G.C., Bandini, S. (eds) Cellular Automata. ACRI 2012. Lecture Notes in Computer Science, vol 7495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33350-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33350-7_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33349-1

  • Online ISBN: 978-3-642-33350-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics