Title: Modelling the spread of mobile malware

Authors: Juil C. Martin, Legand L. Burge III, Joseph I. Gill, Alicia N. Washington, Marcus Alfred

Addresses: Department of Systems and Computer Science, Howard University, 2300 Sixth Street, NW, Washington, DC 20059, USA. ' Department of Systems and Computer Science, Howard University, 2300 Sixth Street, NW, Washington, DC 20059, USA. ' Department of Systems and Computer Science, Howard University, 2300 Sixth Street, NW, Washington, DC 20059, USA. ' Department of Systems and Computer Science, Howard University, 2300 Sixth Street, NW, Washington, DC 20059, USA. ' Department of Physics and Astronomy, Howard University, 2355 6th St., NW, Washington, DC 20059, USA

Abstract: The popularity of mobile phones and the internet makes it more enticing for hackers to write viruses and create malicious code. There are currently over 150 mobile viruses today and the prevalence of mobile viruses in the US is currently at its tipping point. The first known cellular virus in the USA is called Cabir and was discovered in 2004. In this paper, we reveal how cellular phones running the Symbian and Windows Mobile operating systems get infected through various channels, specifically, Bluetooth and 802.11 wireless. We investigated the transmission rate of mobile malware in Washington, DC from 2004 to 2012, focusing our research in the Washington DC metropolitan area being that it has a high risk of cyber terrorism attacks. The goal of our study is to show the impact of mobile malware on cell phones using the SIS epidemic model. We aim to help cell phone users prepare now in the event of a future mobile malware epidemic in the District. We then proposed some preventative measures.

Keywords: SIS epidemic model; mobile malware; Cabir; tipping point; cyber terrorism; Symbian; Windows Mobile; hackers; mobile viruses; malicious code; cell phones mobile phones; USA; United States.

DOI: 10.1504/IJCAET.2010.029592

International Journal of Computer Aided Engineering and Technology, 2010 Vol.2 No.1, pp.3 - 14

Published online: 30 Nov 2009 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article