Font Size: a A A

Propagation Model Of Mobile Phone Buletooth Virus Research

Posted on:2013-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:S W LiFull Text:PDF
GTID:2248330371991491Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the development of the times, mobile phones have become our essential goods, and Bluetooth has become the basic function of the mobile phones. Because the Bluetooth itself has some certain defects, it is often used by some criminals. They write virus programs and spread them through the Bluetooth, which causes the mobile phones’ software and hardware to fail and personal information lost. It seriously affects the mobile phones’ normal usefulness and informational security. Therefore, it is of great significance to strengthen the research on the propagation rule of the mobile’s Bluetooth viruses.Firstly, this essay illustrates the aim and significance of mobile phones’Bluetooth viruses, summarizes all the researches related at home and abroad, points out the deficiency existing, and also predicts the development trend of mobile phones’Bluetooth viruses in the future.Secondly, the essay does some researches on the propagation rule of mobile’s Bluetooth viruses, making a fundament for putting forward a new model. Taking FakeCabire for example, this text explores the propagation process of mobile’s Bluetooth viruses. It divides the whole process into two parts, that’s during the period of propagation and between the periods of propagation. According to the movement of the node, this text discusses the calculation methods of the effective propagation areas, forecasts the possibility that there will be a large outbreak of the mobile’s Bluetooth viruses, and confirms the speculation by the theory of seepage. This text also introduces server classic propagation models of mobile phones’Bluetooth viruses, which have important inspiration and direct effect to this project.Then, this essay sets up a propagation model of mobile phones’Bluetooth viruses based on mean-filed theory. The traditional virus propagation models, such as the simple propagation models, SIR models and SPIR models, are set up based on the well-distributed network, which are seriously unsuitable with the actual situations, and therefore they cannot reflect the propagation rule of the virus very well. This text researches the spatial characteristics and mobile ones of the nodes, sets up a propagation model of mobile phones’Bluetooth viruses based on traditional propagation models, and also discusses the effects of the relative parameters on the propagation of the virus. Simulation results showed that this model matches well with practical satiation, so it’s an effective model.Finally, this text puts forward some strategies of prevention and control aimed at the mobiles’Bluetooth viruses. According to the influences of the various parameters on the propagation of the mobiles’Bluetooth virus in the new model, this text puts forward the corresponding strategies of prevention and control, and makes sure of the responsibility of the mobile phone users, mobile operators, mobile phone manufacturers, antivirus software developers and relevant government departments. This text introduces some commonly used anti-virus technologies and honey net technology which is currently being developed, mainly researches the third generation honey net technology applied on the mobile internet. This is a positive and meaningful exploration about prevention and control of the mobiles’Bluetooth viruses.
Keywords/Search Tags:Bluetooth, propagation model, mean-filed theory, effective area, prevention and control strategies
PDF Full Text Request
Related items