




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
MobileMalwareLikenormalmalware,butonmobilephones(smartphonesanddumbonestoo)Whyworryaboutmobilemalware?“combinationofvulnerableplatforms(symbian),unsuspectingusers,andexplosivegrowthinpotentialvictimswillinevitablyattractpropagatingmalware”MobileMalwareLikenormalmalwWhatMakesThisPaperDifferent?Previousmalwarepropagationresearch:ProximityPropagationBluetooth,etcThisresearch:FocusesonpropagationviathetelecommunicationsnetworkWhatMakesThisPaperDifferenWhyMobleMalware?
(fromthebadguy'sperspective)SmartphonesarealotlikePCs:marketshareperOS(72%symbian)softwarevulnerabilitiesexistExploitedsmartphonescouldprovideanattackerwithmeansto:stealprivatedata/users'identitiesspammakefreecallsexecute(D)DoSWhyMobleMalware?
(fromthebMainPaperGoal(s)SimulatetheeffectsofmobilemalwarepropagationviathetelecommunicationsnetworkSimulatedbothVoIPmalwareandMMSmalwareDrawsomeconclusionsfordefendingMainPaperGoal(s)SimulatethSimulatorEventDriven,CustomCode.(sotheycouldbetteradaptfortheirneeds)1secondstepsize,stepping12hoursInfectionbeginningatasinglephoneTelecomNetworkUMTSTopologyBostonMetroAreaSimulatorEventDriven,CustomNetwork:UMTSUMTSisthe3GsuccessortoGSM(2.5G/GPRS,2.75G/EDGE)NetworksideisverysimilartoGSM,airinterfacesidechangedtosupporthigherdatarates.Signalingandcontrolarenegligible(ignoredinthemodel)Network:UMTSUMTSisthe3GsuTopology:BostonMetroArea100sqmiles,dividedinto1sqmilecellsMobileStationDistributionfromUSCensusdatascaledby78%(bycellphonepenetration)MobilityisnotmodeledAuthorsspeculatethebottleneckwillbeinthenetwork,notattheairinterfaceTopology:BostonMetroArea100SimplifiedUTMSNetworkSimplifiedUTMSNetworkSimulationConstructionAssumenormalMMSusageisbasedonachargepermessageMMSServerCapacityServerhandles100msg/sec,althoughhigherratesweresimulatedwith“aqualitativelysimilarresult”Authorsexplanation:MMSserverwillnotbedimensionedtohandleusersbehavinglikeanaggressiveworm(i.e.,sendinglargenumbersofmessagesasquicklyaspossible).Bottom-updesignoftheUMTSNetworkSimulationConstructionAssumeSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkModeledUTMSNetworkModeledUTMSNetworkSimulationParameters1singleserverserving100msg/sec49serversserving10kuserseach49servers9616NodeB's2Mbps100Mbps1GbpslinksbetweenSGSNsSimulationParameters1singleSimulationNotes“ThegranularityofourNodeBplacementwasalimitingfactorofourinitialpopulationdata.Afinergranularitywould,nodoubt,offeramoredetailedandaccuratepictureofmalwarepropagation.”SimulationNotes“ThegranulariSpreadingviaPhonebooks/ContactListsNopublishedstudiesofaddressbookcharacteristicsfound,so:1-1000contacts(upperlimitfromempiricaldataonphonebookmaximums)Phonebook/contactdegreedistributionsbasedonstatisticalanalysisSpreadingviaPhonebooks/ContPhonebook/contactdegreedistributions
(forcontactlistsize)Power-Law:fromyahooemailgroups,andotherauthors'research.Log-Normal:fromsocialnetworkingwebsites'statistics.ErlangDist:fromauthors'experiment(butverysmallsamplesizeof73)Phonebook/contactdegreedistrNodeAttachment...youdontcalleverybodyinyouraddressbookProbabilisticallyrandomlyassignaddressbooksizebasedondistribution,then...70%-“Theprobabilitythattwouserswerefriendswasproportionaltotheinverseofthenumberofpeoplebetweenthem.”(fromLiveJournalstudy)30%uniformlyrandomlyassignedNodeAttachment...youdontcAttackVector:VoIPAssumesvulnerableserviceonthemobilephonewhichdoesnotrequireuserinteractionAssumeallphonesarevulnerable.(Authorsnotethatinrealityafractionwouldbevulnerable,andtheystateaqualitativelysimilarresult)AttackVector:VoIPAssumesvulSimulatedPropagationofVoIPMalware“...constrainedbandwidthshouldalsobeconsidered;butdoingsorequiresestimatingtypicaltrafficcharacteristics,andwelackedmeaningfuldataonwhichtobasesuchestimates.”---?????SimulatedPropagationofVoIPTechniquesforFasterPropagationofVoIPMalware(andSimulationResults)Divideanddistribute(transfer)contactsfromaddressbookCongestionbackoff(wait)10sTechniquesforFasterPropagatAttackVector:MMSHandledbycentralMMSserverRequiresuserinteractiononlyapercentage“F”actonmessageCanbedonewhilephoneisoffSothereisawaittimetoanswermessages.MixtureoftwoGaussiandistributionscenteredat20s&45mAttackVector:MMSHandledbycSimulatedPropagationofMMSMalwareSimulatedPropagationofMMSMTechniquesforFasterPropagationofMMSMalwareCongestionbackoff(10s)Notverymuchadvantage,duetoMMScentralserverconstraint.DivideanddistributecontactsfromaddressbookSameasaboveGlobalcontactbookmethodInfectedhalfthepopulationin12hrs.(whatFvalue?)TechniquesforFasterPropagatFasterMMSMalwarePropagationFasterMMSMalwarePropagationDefendingAgainstMobileMalwarePropagationinTelecom.Networks(Thissectioniswaytoosmallinthepaper,wouldhavelikedtoseemoreonthis.)RateLimitingACCELLERATESinfection!(sameascongestionavoidance)BlacklistingContainmentlargenumberstillgetinfectedmoreslowly(nodetailsgivenon%).removingphonesleadstoalesscongestednetworkforthoseinfectedbutnon-blacklistedphonesContentFiltering“Seemspromisingduetocentralizedtopology.”"Investigatingwhetherit'spracticalremainsfuturework."(andtheydidntprovideanyinformationonhowpromisingorwhy)DefendingAgainstMobileMalwaQuestions?Questions?MobileMalwareLikenormalmalware,butonmobilephones(smartphonesanddumbonestoo)Whyworryaboutmobilemalware?“combinationofvulnerableplatforms(symbian),unsuspectingusers,andexplosivegrowthinpotentialvictimswillinevitablyattractpropagatingmalware”MobileMalwareLikenormalmalwWhatMakesThisPaperDifferent?Previousmalwarepropagationresearch:ProximityPropagationBluetooth,etcThisresearch:FocusesonpropagationviathetelecommunicationsnetworkWhatMakesThisPaperDifferenWhyMobleMalware?
(fromthebadguy'sperspective)SmartphonesarealotlikePCs:marketshareperOS(72%symbian)softwarevulnerabilitiesexistExploitedsmartphonescouldprovideanattackerwithmeansto:stealprivatedata/users'identitiesspammakefreecallsexecute(D)DoSWhyMobleMalware?
(fromthebMainPaperGoal(s)SimulatetheeffectsofmobilemalwarepropagationviathetelecommunicationsnetworkSimulatedbothVoIPmalwareandMMSmalwareDrawsomeconclusionsfordefendingMainPaperGoal(s)SimulatethSimulatorEventDriven,CustomCode.(sotheycouldbetteradaptfortheirneeds)1secondstepsize,stepping12hoursInfectionbeginningatasinglephoneTelecomNetworkUMTSTopologyBostonMetroAreaSimulatorEventDriven,CustomNetwork:UMTSUMTSisthe3GsuccessortoGSM(2.5G/GPRS,2.75G/EDGE)NetworksideisverysimilartoGSM,airinterfacesidechangedtosupporthigherdatarates.Signalingandcontrolarenegligible(ignoredinthemodel)Network:UMTSUMTSisthe3GsuTopology:BostonMetroArea100sqmiles,dividedinto1sqmilecellsMobileStationDistributionfromUSCensusdatascaledby78%(bycellphonepenetration)MobilityisnotmodeledAuthorsspeculatethebottleneckwillbeinthenetwork,notattheairinterfaceTopology:BostonMetroArea100SimplifiedUTMSNetworkSimplifiedUTMSNetworkSimulationConstructionAssumenormalMMSusageisbasedonachargepermessageMMSServerCapacityServerhandles100msg/sec,althoughhigherratesweresimulatedwith“aqualitativelysimilarresult”Authorsexplanation:MMSserverwillnotbedimensionedtohandleusersbehavinglikeanaggressiveworm(i.e.,sendinglargenumbersofmessagesasquicklyaspossible).Bottom-updesignoftheUMTSNetworkSimulationConstructionAssumeSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkModeledUTMSNetworkModeledUTMSNetworkSimulationParameters1singleserverserving100msg/sec49serversserving10kuserseach49servers9616NodeB's2Mbps100Mbps1GbpslinksbetweenSGSNsSimulationParameters1singleSimulationNotes“ThegranularityofourNodeBplacementwasalimitingfactorofourinitialpopulationdata.Afinergranularitywould,nodoubt,offeramoredetailedandaccuratepictureofmalwarepropagation.”SimulationNotes“ThegranulariSpreadingviaPhonebooks/ContactListsNopublishedstudiesofaddressbookcharacteristicsfound,so:1-1000contacts(upperlimitfromempiricaldataonphonebookmaximums)Phonebook/contactdegreedistributionsbasedonstatisticalanalysisSpreadingviaPhonebooks/ContPhonebook/contactdegreedistributions
(forcontactlistsize)Power-Law:fromyahooemailgroups,andotherauthors'research.Log-Normal:fromsocialnetworkingwebsites'statistics.ErlangDist:fromauthors'experiment(butverysmallsamplesizeof73)Phonebook/contactdegreedistrNodeAttachment...youdontcalleverybodyinyouraddressbookProbabilisticallyrandomlyassignaddressbooksizebasedondistribution,then...70%-“Theprobabilitythattwouserswerefriendswasproportionaltotheinverseofthenumberofpeoplebetweenthem.”(fromLiveJournalstudy)30%uniformlyrandomlyassignedNodeAttachment...youdontcAttackVector:VoIPAssumesvulnerableserviceonthemobilephonewhichdoesnotrequireuserinteractionAssumeallphonesarevulnerable.(Authorsnotethatinrealityafractionwouldbevulnerable,andtheystateaqualitativelysimilarresult)AttackVector:VoIPAssumesvulSimulatedPropagationofVoIPMalware“...constrainedbandwidthshouldalsobeconsidered;butdoingsorequiresestimatingtypicaltrafficcharacteristics,andwelackedmeaningfuldataonwhichtobasesuchestimates.”---?????SimulatedPropagationofVoIPTechniquesforFasterPropagationofVoIPMalware(andSimulationResults)Divideanddistribute(transfer)contactsfromaddressbookCongestionbackoff(wait)10sTechniquesforFasterPropagatAttackVector:MMSHandledbycentralMMSserverRequiresuserinteractiononlyapercentage“F”actonmessageCanbedonewhilephoneisof
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 夸赞学生作业的评语
- 2025-2030年中国ppr管材行运行状况及发展趋势预测研究报告
- 2025-2030年中国PC钢棒市场发展格局及行业投资风险预测研究报告
- 烟台文化旅游职业学院《现代汉语理论与方法》2023-2024学年第二学期期末试卷
- 2025-2030年中国CT机市场投资潜力及展趋势预测研究报告
- 脑动脉炎的临床护理
- 苏教版六上习作教学设计
- 提升客户关系管理的年度计划
- 理清思路的个人发展地图计划
- 2025-2030国内PE保护膜行业深度分析及竞争格局与发展前景预测研究报告
- 耳鼻喉科学第二十三章耳部疾病讲解
- 2024年天津市高考物理试题含答案解析
- 未来学校建筑的现代设计思考与创新
- 一般担保合同范例
- 护理不良事件:管路滑脱
- 特殊医学用途配方食品管理制度
- ERP项目可行性研究报告(可编辑)
- (完整版)信号与系统(吴大正)-完整版答案-纠错修改后版本
- 2024年第四季度 国家电网工程设备材料信息参考价
- 2025标准新版装修合同范本
- 足球俱乐部青训管理制度
评论
0/150
提交评论