Skip to main content
Log in

A defense model against mobile phone malicious codes based on social computing

  • Security of Network and Trust Computation
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

With the convergence of mobile communication network and Internet in depth, mobile Internet is penetrating into every field of people’s life. Smart phone bring us great convenience, but it also becomes the breeding ground for the spread of malicious codes. In this paper, we propose a trust transfer algorithm based on the ant colony optimization algorithm to calculate the trust degree between any two nodes in the social network. Afterwards, a defense model based on social computing is presented for mobile phone malware. The simulation results show that our trust transfer algorithm improves the computation accuracy of indirect trust value by 14.65% compared with the TidalTrust algorithm, and the patch transmission speed of our model is faster than that of others.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bulut E, Szymanski B K. Exploiting friendship relations for efficient routing in mobile social networks [J]. Parallel and Distributed Systems, IEEE Transactions on, 2012, 23(12): 2254–2265.

    Article  Google Scholar 

  2. Suarez-Tangil G, Tapiador J E, Peris-Lopez P, et al. Evolution, detection and analysis of malware for smart devices [J]. Communications Surveys & Tutorials, IEEE, 2014, 16(2): 961–987.

    Article  Google Scholar 

  3. Sahs J, Khan L. A machine learning approach to android malware detection [C] // Intelligence and Security Informatics Conference (EISIC), European. Odense: IEEE Press, 2012: 141–147

    Google Scholar 

  4. Sun X. Research on simulation and modeling of social network worm propagation [J]. Chinese Journal of Computer, 2011, 34(7): 1252–1261 (Ch).

    Article  Google Scholar 

  5. Wei Q, Ren M, Chen G. Towards understanding dynamics of mobile phone worm propagation using social network analysis [C] // 2009 Eighth International Conference on Mobile Business. Piscataway: IEEE Press, 2009: 290–295.

    Chapter  Google Scholar 

  6. Zhu Z, Cao G, Zhu S, et al. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks [M]. New York: Springer-Verlag, 2012.

    Book  Google Scholar 

  7. Iglesias J A, Tiemblo A, Ledezma A, et al. Web news mining in an evolving framework [J]. Information Fusion, 2016, 28: 90–98.

    Article  Google Scholar 

  8. Parameswaran M, Whinston A B. Social computing: An overview [J]. Communications of the Association for Information Systems, 2007, 19(1): 762–780.

    Google Scholar 

  9. F-Secure. F-secure virus information pages: Cabir [EB/OL].[2016-11-08]. http://www.fsecure.com/v-descs/cabir.shtml.

  10. Datatang. Email social NetWork data [EB/OL].[2016-11-08]. http://www.datatang.com/data/45061.

  11. Jiang W, Wu J, Wang G, et al. Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics [J]. IEEE Transactions on Computers, 2016, 65(4): 1211–1224.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leyi Shi.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (91438117) and the Funding of Shanghai Key Laboratory of Financial Information Technology(2015)

Biography: SHI Leyi, male, Ph.D., Professor, research direction: network and information security, cyber defense, game theory, and mobile Internet

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, L., Liu, X. & Wang, Y. A defense model against mobile phone malicious codes based on social computing. Wuhan Univ. J. Nat. Sci. 22, 134–140 (2017). https://doi.org/10.1007/s11859-017-1226-5

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-017-1226-5

Key words

CLC number

Navigation