




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
MobileMalwareLikenormalmalware,butonmobilephones(smartphonesanddumbonestoo)Whyworryaboutmobilemalware?“combinationofvulnerableplatforms(symbian),unsuspectingusers,andexplosivegrowthinpotentialvictimswillinevitablyattractpropagatingmalware”MobileMalwareLikenormalmalwWhatMakesThisPaperDifferent?Previousmalwarepropagationresearch:ProximityPropagationBluetooth,etcThisresearch:FocusesonpropagationviathetelecommunicationsnetworkWhatMakesThisPaperDifferenWhyMobleMalware?
(fromthebadguy'sperspective)SmartphonesarealotlikePCs:marketshareperOS(72%symbian)softwarevulnerabilitiesexistExploitedsmartphonescouldprovideanattackerwithmeansto:stealprivatedata/users'identitiesspammakefreecallsexecute(D)DoSWhyMobleMalware?
(fromthebMainPaperGoal(s)SimulatetheeffectsofmobilemalwarepropagationviathetelecommunicationsnetworkSimulatedbothVoIPmalwareandMMSmalwareDrawsomeconclusionsfordefendingMainPaperGoal(s)SimulatethSimulatorEventDriven,CustomCode.(sotheycouldbetteradaptfortheirneeds)1secondstepsize,stepping12hoursInfectionbeginningatasinglephoneTelecomNetworkUMTSTopologyBostonMetroAreaSimulatorEventDriven,CustomNetwork:UMTSUMTSisthe3GsuccessortoGSM(2.5G/GPRS,2.75G/EDGE)NetworksideisverysimilartoGSM,airinterfacesidechangedtosupporthigherdatarates.Signalingandcontrolarenegligible(ignoredinthemodel)Network:UMTSUMTSisthe3GsuTopology:BostonMetroArea100sqmiles,dividedinto1sqmilecellsMobileStationDistributionfromUSCensusdatascaledby78%(bycellphonepenetration)MobilityisnotmodeledAuthorsspeculatethebottleneckwillbeinthenetwork,notattheairinterfaceTopology:BostonMetroArea100SimplifiedUTMSNetworkSimplifiedUTMSNetworkSimulationConstructionAssumenormalMMSusageisbasedonachargepermessageMMSServerCapacityServerhandles100msg/sec,althoughhigherratesweresimulatedwith“aqualitativelysimilarresult”Authorsexplanation:MMSserverwillnotbedimensionedtohandleusersbehavinglikeanaggressiveworm(i.e.,sendinglargenumbersofmessagesasquicklyaspossible).Bottom-updesignoftheUMTSNetworkSimulationConstructionAssumeSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkModeledUTMSNetworkModeledUTMSNetworkSimulationParameters1singleserverserving100msg/sec49serversserving10kuserseach49servers9616NodeB's2Mbps100Mbps1GbpslinksbetweenSGSNsSimulationParameters1singleSimulationNotes“ThegranularityofourNodeBplacementwasalimitingfactorofourinitialpopulationdata.Afinergranularitywould,nodoubt,offeramoredetailedandaccuratepictureofmalwarepropagation.”SimulationNotes“ThegranulariSpreadingviaPhonebooks/ContactListsNopublishedstudiesofaddressbookcharacteristicsfound,so:1-1000contacts(upperlimitfromempiricaldataonphonebookmaximums)Phonebook/contactdegreedistributionsbasedonstatisticalanalysisSpreadingviaPhonebooks/ContPhonebook/contactdegreedistributions
(forcontactlistsize)Power-Law:fromyahooemailgroups,andotherauthors'research.Log-Normal:fromsocialnetworkingwebsites'statistics.ErlangDist:fromauthors'experiment(butverysmallsamplesizeof73)Phonebook/contactdegreedistrNodeAttachment...youdontcalleverybodyinyouraddressbookProbabilisticallyrandomlyassignaddressbooksizebasedondistribution,then...70%-“Theprobabilitythattwouserswerefriendswasproportionaltotheinverseofthenumberofpeoplebetweenthem.”(fromLiveJournalstudy)30%uniformlyrandomlyassignedNodeAttachment...youdontcAttackVector:VoIPAssumesvulnerableserviceonthemobilephonewhichdoesnotrequireuserinteractionAssumeallphonesarevulnerable.(Authorsnotethatinrealityafractionwouldbevulnerable,andtheystateaqualitativelysimilarresult)AttackVector:VoIPAssumesvulSimulatedPropagationofVoIPMalware“...constrainedbandwidthshouldalsobeconsidered;butdoingsorequiresestimatingtypicaltrafficcharacteristics,andwelackedmeaningfuldataonwhichtobasesuchestimates.”---?????SimulatedPropagationofVoIPTechniquesforFasterPropagationofVoIPMalware(andSimulationResults)Divideanddistribute(transfer)contactsfromaddressbookCongestionbackoff(wait)10sTechniquesforFasterPropagatAttackVector:MMSHandledbycentralMMSserverRequiresuserinteractiononlyapercentage“F”actonmessageCanbedonewhilephoneisoffSothereisawaittimetoanswermessages.MixtureoftwoGaussiandistributionscenteredat20s&45mAttackVector:MMSHandledbycSimulatedPropagationofMMSMalwareSimulatedPropagationofMMSMTechniquesforFasterPropagationofMMSMalwareCongestionbackoff(10s)Notverymuchadvantage,duetoMMScentralserverconstraint.DivideanddistributecontactsfromaddressbookSameasaboveGlobalcontactbookmethodInfectedhalfthepopulationin12hrs.(whatFvalue?)TechniquesforFasterPropagatFasterMMSMalwarePropagationFasterMMSMalwarePropagationDefendingAgainstMobileMalwarePropagationinTelecom.Networks(Thissectioniswaytoosmallinthepaper,wouldhavelikedtoseemoreonthis.)RateLimitingACCELLERATESinfection!(sameascongestionavoidance)BlacklistingContainmentlargenumberstillgetinfectedmoreslowly(nodetailsgivenon%).removingphonesleadstoalesscongestednetworkforthoseinfectedbutnon-blacklistedphonesContentFiltering“Seemspromisingduetocentralizedtopology.”"Investigatingwhetherit'spracticalremainsfuturework."(andtheydidntprovideanyinformationonhowpromisingorwhy)DefendingAgainstMobileMalwaQuestions?Questions?MobileMalwareLikenormalmalware,butonmobilephones(smartphonesanddumbonestoo)Whyworryaboutmobilemalware?“combinationofvulnerableplatforms(symbian),unsuspectingusers,andexplosivegrowthinpotentialvictimswillinevitablyattractpropagatingmalware”MobileMalwareLikenormalmalwWhatMakesThisPaperDifferent?Previousmalwarepropagationresearch:ProximityPropagationBluetooth,etcThisresearch:FocusesonpropagationviathetelecommunicationsnetworkWhatMakesThisPaperDifferenWhyMobleMalware?
(fromthebadguy'sperspective)SmartphonesarealotlikePCs:marketshareperOS(72%symbian)softwarevulnerabilitiesexistExploitedsmartphonescouldprovideanattackerwithmeansto:stealprivatedata/users'identitiesspammakefreecallsexecute(D)DoSWhyMobleMalware?
(fromthebMainPaperGoal(s)SimulatetheeffectsofmobilemalwarepropagationviathetelecommunicationsnetworkSimulatedbothVoIPmalwareandMMSmalwareDrawsomeconclusionsfordefendingMainPaperGoal(s)SimulatethSimulatorEventDriven,CustomCode.(sotheycouldbetteradaptfortheirneeds)1secondstepsize,stepping12hoursInfectionbeginningatasinglephoneTelecomNetworkUMTSTopologyBostonMetroAreaSimulatorEventDriven,CustomNetwork:UMTSUMTSisthe3GsuccessortoGSM(2.5G/GPRS,2.75G/EDGE)NetworksideisverysimilartoGSM,airinterfacesidechangedtosupporthigherdatarates.Signalingandcontrolarenegligible(ignoredinthemodel)Network:UMTSUMTSisthe3GsuTopology:BostonMetroArea100sqmiles,dividedinto1sqmilecellsMobileStationDistributionfromUSCensusdatascaledby78%(bycellphonepenetration)MobilityisnotmodeledAuthorsspeculatethebottleneckwillbeinthenetwork,notattheairinterfaceTopology:BostonMetroArea100SimplifiedUTMSNetworkSimplifiedUTMSNetworkSimulationConstructionAssumenormalMMSusageisbasedonachargepermessageMMSServerCapacityServerhandles100msg/sec,althoughhigherratesweresimulatedwith“aqualitativelysimilarresult”Authorsexplanation:MMSserverwillnotbedimensionedtohandleusersbehavinglikeanaggressiveworm(i.e.,sendinglargenumbersofmessagesasquicklyaspossible).Bottom-updesignoftheUMTSNetworkSimulationConstructionAssumeSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkSimplifiedUTMSNetworkModeledUTMSNetworkModeledUTMSNetworkSimulationParameters1singleserverserving100msg/sec49serversserving10kuserseach49servers9616NodeB's2Mbps100Mbps1GbpslinksbetweenSGSNsSimulationParameters1singleSimulationNotes“ThegranularityofourNodeBplacementwasalimitingfactorofourinitialpopulationdata.Afinergranularitywould,nodoubt,offeramoredetailedandaccuratepictureofmalwarepropagation.”SimulationNotes“ThegranulariSpreadingviaPhonebooks/ContactListsNopublishedstudiesofaddressbookcharacteristicsfound,so:1-1000contacts(upperlimitfromempiricaldataonphonebookmaximums)Phonebook/contactdegreedistributionsbasedonstatisticalanalysisSpreadingviaPhonebooks/ContPhonebook/contactdegreedistributions
(forcontactlistsize)Power-Law:fromyahooemailgroups,andotherauthors'research.Log-Normal:fromsocialnetworkingwebsites'statistics.ErlangDist:fromauthors'experiment(butverysmallsamplesizeof73)Phonebook/contactdegreedistrNodeAttachment...youdontcalleverybodyinyouraddressbookProbabilisticallyrandomlyassignaddressbooksizebasedondistribution,then...70%-“Theprobabilitythattwouserswerefriendswasproportionaltotheinverseofthenumberofpeoplebetweenthem.”(fromLiveJournalstudy)30%uniformlyrandomlyassignedNodeAttachment...youdontcAttackVector:VoIPAssumesvulnerableserviceonthemobilephonewhichdoesnotrequireuserinteractionAssumeallphonesarevulnerable.(Authorsnotethatinrealityafractionwouldbevulnerable,andtheystateaqualitativelysimilarresult)AttackVector:VoIPAssumesvulSimulatedPropagationofVoIPMalware“...constrainedbandwidthshouldalsobeconsidered;butdoingsorequiresestimatingtypicaltrafficcharacteristics,andwelackedmeaningfuldataonwhichtobasesuchestimates.”---?????SimulatedPropagationofVoIPTechniquesforFasterPropagationofVoIPMalware(andSimulationResults)Divideanddistribute(transfer)contactsfromaddressbookCongestionbackoff(wait)10sTechniquesforFasterPropagatAttackVector:MMSHandledbycentralMMSserverRequiresuserinteractiononlyapercentage“F”actonmessageCanbedonewhilephoneisof
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 臂神经痛的临床护理
- 2025酒店管理委托合同
- 胃反应性淋巴增生的临床护理
- 2025企业委托代理经营合同范本
- 2025指定赠与合同范文
- 生理学期末测试卷及答案
- 上栗县六年级试卷及答案
- 山东英语八下期末试卷及答案
- MRPⅡ原理专题培训讲义
- 石油开采与能源安全战略考核试卷
- 网络安全和保密意识教育
- 《桥梁健康监测》课件
- 企业安全生产“一企一册”“一岗一册”制度简介
- 耳鼻喉科学第二十三章耳部疾病讲解
- 2024年天津市高考物理试题含答案解析
- 未来学校建筑的现代设计思考与创新
- 一般担保合同范例
- 护理不良事件:管路滑脱
- 特殊医学用途配方食品管理制度
- ERP项目可行性研究报告(可编辑)
- (完整版)信号与系统(吴大正)-完整版答案-纠错修改后版本
评论
0/150
提交评论