IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. I (Jan – Feb. 2016), PP 80-83
www.iosrjournals.org
DOI: 10.9790/0661-18118083 www.iosrjournals.org 80 | Page
Assorted Strategy for the Finest Malware Defense in
Portable Set-Up
Pothuri Ramyamadhuri1
, Dasari Ravi Kumar2
#1Student of M. Tech(CSE) and #2 Asst. Prof, Department of Information Technology, QIS Institute of
technology, Ongole. A.P, India.
Abstract: The specialized difficulties in mobile devices are that these are heterogeneous as far as working
frameworks; the malware taints the focused framework in any shrewd manner through the neighborhood and
the worldwide integration, while the to-be-sent barrier framework then again would be normally asset
restricted. Through hypothetical investigation and reenactments with both engineered and also reasonable
versatility follows, we demonstrate that the circulated calculation accomplishes ideal arrangement, and
performs effectively in all practical situations. As malware assaults turn out to be the more often in portable
systems, conveying a productive guard framework to ensure against disease and to help the tainted hubs to
recoup is imperative to avert genuine spreading and flare-ups. We display the barrier framework with
reasonable suspicions tending to all the above difficulties that have not been tended to in past logical work. In
the view of structure of improving the framework welfare utility, which is the weighted summation of individual
utility relying upon the last number of tainted hubs through the mark portion, we propose an experience
construct dispersed calculation situated in light of Metropolis sampler. In this paper, we investigate the issue of
how to in a perfect world, pass on the substance based characteristics of malware, which serves to recognize the
relating malware and weaken further multiplication, to minimize the amount of corrupted center points.
Key Terms- Signature, Dissemination, Proximity malware, Heterogeneous mobile devices.
I. Introduction:
The systems are significantly focused on malware assaults. So far we've seen countless against
individual PCs and different gadgets. Be that as it may, assaults progressively rely on upon network. Consider
the accompanying illustrations. An office laborer snaps on a connection in email. This contaminates PC with
malware that bargains different machines in her office by snooping passwords that go over the LAN. The reason
she tapped on the connection is that the email originated from her mom. The malware had tainted her mom's
machine and after that conveyed a duplicate of a late email, with itself connected, to everybody in mum's
location book portable malware examples of more than 350 reported in mid-2007. This is fundamentally as a
result of two reasons. One is the development of capable cell phones, for example, the iPhone, Blackberry, and
Android gadgets, and progressively expanded portable applications, for example, Multimedia Messaging
Service (MMS). A delay tolerant framework needs hardware that can store generous measure of data. Such
media must have the ability to survive intensified power incident and after that system restarts. It must be
rapidly accessible at whatever point we need. Flawless advances thus consolidate high-volume streak memory
and hard drives. The data set away on these media must be dealt with and composed by programming which
ensures exact and strong store-and-forward helpfulness. In a deferral tolerant framework, development can in
like manner be requested in three ways i.e. encouraged, conventional and mass altogether of their lessening
need. Encouraged packages are always transmitted, and affirmed before data of some different class from an
offered source to a given destination. There are numerous assaults, and resistances, that develop once we have
expansive quantities of machines arranged together. These rely on upon various components, the most critical of
which are the conventions the system employments. A second arrangement of variables identify with the
topology of the system: is each machine ready to contact each other machine, or does it just have direct access to
a modest bunch of others? In our case over, an infection spreads itself through an informal community —
starting with one companion then onto the next, much the same as the influenza infection
II. Related Work:
Various approaches for detecting network scanning have been proposed in the literature. The majority
of these need to look only at the IP or TCP/UDP packet headersof the network track. Dierent subsets of header
contents are analyzed by dierentscan detection mechanisms in order to infer scanning activity. While the
analysisisusually depends on statistical models, there are machine learning based methods andvisual-based
mechanisms. Few proposals correlate remote scanners to detect coordinated scans.Thus, we can assign a scanner
as a host whichinitiates a single or multiple connection attempts destined to one or multiple ports inone or
Assorted Strategy for the Finest Malware Defense in Portable Set-Up
DOI: 10.9790/0661-18118083 www.iosrjournals.org 81 | Page
multiple destination hosts for the purpose of ending out if all or some of thetargeted ports are oaringaccessible
network services or to and out if all or some ofthe targeted hosts are active.
III. Network Attack And Defense:
IPsec is widely used by firewall vendors who offer avirtual private networkfacility with their products;
that is, by installing one of their boxes in eachbranch between the local LAN and the router, all the internal
traffic can passencrypted over the Internet. Individual PCs, such as workers‟ laptops andhome PCs, can in
theory join a VPN given a firewall that supports IPsec, butthis is harder than it looks. Compatibility has been a
major problem withdifferent manufacturers‟ offerings just not working with each other; althoughfirewall-to-
firewall compatibility has improved recently, getting random PCsto work with a given VPN is still very much a
hit-or-miss affair.IPsec has the potential to stop some network attacks, and be a useful component in designing
robust distributed systems. But it isn‟t a panacea. Indeed, virtual private networks exacerbate
„deperimeterization‟ problem alreadydiscussed. If we have thousands ofmachines sitting in our
employee‟shomes that are both in the network (as they connect via a VPN) and connectedto the Internet (as their
browser talks to the Internet directly via the home‟scable modem) then they become a potential weak point.
(Indeed, the U.S.Department of Justice ruled in 2007 that employees can‟t use their own PCs orPDAs for work
purposes; all mobile devices used for departmental businessmust be centrally managed.
IV. Algorithms
i.Greedy algorithm
This algorithm is the recursive algorithm. It follows a step by step procedure. This algorithm is used to
increase the system welfare. System welfare is nothing but the sum of individual utilities with different
weighing factors according to the final number of infected nodes. The algorithm repeatedly chooses signatures
to store in the helpers: in each step, it tries to select one signature that brings the maximum system utility for a
helper that still has enough storage. Therefore, our algorithm is likely to allocate more helpers to store the
signatures of malware whose corresponding malware-defending utilities are larger than others, which is
achieved by using the heterogeneous features in terms of devices and malware. The step by step procedure is as
follows.
i. Initially no helper has signature, number of helpers is zero and also system welfare is initially zero.
ii. Initialize the set of malwares and set the sum to zero.
iii. For every malware, calculate the system welfare.
iv. While sum less than maximum number of signatures that can be stored in helpers and malware set is not
empty,
v. Select the signature i such that it brings maximum system utility.
vi. And select the helper l such that maximum number of signatures can be stored in that.
vii. Now set the new indicator that helper has signature to 1.
viii. Update the number of helpers and sum.
ix. Update the system welfare.
x. Now if the number of helpers is greater than or equal to total number of helpers,
xi. Then there will be a signature for every malware.
xii. End while.
ii.Encounter based distributed algorithm
This algorithm is used to distribute the content based signatures. In this the nodes exchange their
signatures when they encounter with each other based on some conditions. So we consider every encounter
between any two helpers as one step of configuration changing in the algorithm. Consider the two nodes i,j,
when nodes i and j meet, each one adjusts its current configuration according to the others. More specifically,
one node, say i, randomly chooses a signature in its own buffer, and randomly chooses another one that is not in
its buffer but in the buffer of node j to replace the chosen signature, which comes to a tentative configuration.
The distributed algorithm of signature distribution for Node i to adjust its configuration when encountering
Node j is as follows.
i. Intially check whether the two nodes i,j are having same signatures.
ii. If yes, then end the process. Since there is no need to exchange the signatures.
iii. Otherwise, if there is at least one signature existing in node j, but does not exists in node i,
iv. Then add one to the encounter counter, say n which counts every encounter between the nodes.
v. Now select a signature c from the buffer of node i uniform randomly such that node i have that
signature. And select a signature c1
from the buffer of node j uniform randomly such that the signature is
present only in the buffer of node j but not in node i.
vi. Now set the system temperature to Tn .
Assorted Strategy for the Finest Malware Defense in Portable Set-Up
DOI: 10.9790/0661-18118083 www.iosrjournals.org 82 | Page
vii. Now compute the acceptance probability for the node i to accept that signature.
viii. Draw a random number R uniform distributed in (0,1];
ix. If that random number is less than the acceptance probability then,
x. Node i selects signature c1
and drops c.
V. Performance Evaluation
Centralized Greedy Algorithm
In this section, we present numerical results with the goal ofdemonstrating that our greedyalgorithm for
signaturedistribution, denoted OPT, achieves the optimal solution and yields significant enhancement on the
system welfarecompared with prior heuristic algorithms.The simulation results are shown in Fig.1(a) and 1(b).
Fig. 1a shows the number of infected nodes according to the malware recovering rates caused by the signature
distribution in the greedy algorithm. We can observe that the number of infected nodes decreases with the
increase of recovering rate. Among different algorithms, IF provides the worst performance.Fig. 1b shows
thenumber of infected nodes according to the malwarespreading rates. Different from Fig. 1a, the number
ofinfected nodes increases with the growth of spreading rate.From these results, we can observe that PA obtains
relatively better performance than FI and UR, which are expected to underperform.
1a) variable malware recovering rate; and 1(b) variable malware spreading rate
Mobility Model Simulation
we measure the malware infected ratio of nodes againsttime, and the obtained results under the SWIM
and SLAWmobility models are shown in Fig. 2a and 2b, respectively.From the results, we can observe that the
greedy algorithm performs better than the distributed algorithm when the time is short. But the distributed
algorithm approaches the performance of the greedy algorithm with the increase of the time. When the time is
longer enough, these two schemes have the same performance. Therefore, we can conclude that our distribution
algorithm approaches the optimal system performance.
Fig 2(a) and 2(b): System performance of malware infected ratio under different mobility models of (a) SWIM,
and (b) SLAW
VI. Conclusion
We have described a framework for developing and deploying a global crowd sourced defensive
network to make auto mated network based threat detection, information sharing, and defense accessible to the
Assorted Strategy for the Finest Malware Defense in Portable Set-Up
DOI: 10.9790/0661-18118083 www.iosrjournals.org 83 | Page
masses. As malicious actors continue to find innovative ways to wreak havoc against unsuspecting internet users
on an unprecedented scale, the need for a more panoramic view of network based threats is clear. It is also clear
to us that cooperative defense strategies hold the most hope for the effective defense against
numerouscooperative aggressors. While the large commercial organizations such as major software vendors
stand to gain less defensive benefit from participation in a CODON than home the end users , their reputations
are likely to improve as their customers and potential customers benefit from timely threat information sharing
and a history of being a “good neighbor” in the wild and dangerous internet. We believe that even a low
CODON participation rate can have a noticeable positive effect on the internet by providing quick and
actionable intelligence to those system administrators with the unique resources and specialized tools necessary
for mitigating distributed attacks. Even the formation of many small CODONs based on differing geopolitical,
ideological, and commercial motivators would provide a benefit to the larger internet community as different
“neighborhoods” of the internet become safer.
References
[1] P. Wang, M. Gonzalez, C. Hidalgo, and A. Barabasi, “Understanding the Spreading Patterns of Mobile Phone Viruses,” Science,
vol. 324, no. 5930, pp. 1071-1076, 2009.
[2] M. Hypponen, “Mobile Malwar,” Proc. 16th USENIX Security Symp., 2007.
[3] M. Khouzani, S. Sarkar, and E. Altman, “Maximum Damage Malware Attack in Mobile Wireless Networks,” Proc. IEEE
INFOCOM, 2010.
[4] Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, “A Social Network Based Patching Scheme for Worm Containment in Cellular
Networks,” Proc. IEEE INFOCOM, 2009.
[5] G. Zyba, G. Voelker, M. Liljenstam, A. Me´hes, and P. Johansson, “Defending Mobile Phones from Proximity Malware,” Proc.
IEEE INFOCOM, 2009.
[6] F. Li, Y. Yang, and J. Wu, “CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-Based Mobile Networks,”
Proc. IEEE INFOCOM, 2009.
[7] M. Grossglauser and D. Tse, “Mobility Increases The Capacity of Ad-Hoc Wireless Networks,” Proc. IEEE INFOCOM, pp. 1360-
1369, 2001.
[8] R. May and A. Lloyd, “Infection Dynamics on Scale-Free Networks,” Physical Rev. E, vol. 64, no. 6, p. 066112, 2001.
[9] E. Altman, G. Neglia, F. De Pellegrini, and D. Miorandi, “Decentralized Stochastic Control of Delay Tolerant Networks,” Proc.
IEEE INFOCOM, 2009.
[10] M. Khouzani, S. Sarkar, and E. Altman, “Dispatch then Stop: Optimal Dissemination of Security Patches in Mobile Wireless
Networks,” Proc. IEEE 49th Conf. Decision and Control (CDC), pp. 2354-2359, 2010.
AUTHORS:
POTHURI RAMYA MADHURI is Pursuing M.Tech (ComputerScience and Engineering)
from QIS Institute of Technology, Prakasam Dist, Andhra Pradesh, India.
DASARI RAVIKUMAR currently working as Asst.Professor in QIS Institute of
Technology, in the Department of Information Technology, Ongole, Prakasam Dist, Andhra
Pradesh, India.

L018118083.new ramya publication (1)

  • 1.
    IOSR Journal ofComputer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. I (Jan – Feb. 2016), PP 80-83 www.iosrjournals.org DOI: 10.9790/0661-18118083 www.iosrjournals.org 80 | Page Assorted Strategy for the Finest Malware Defense in Portable Set-Up Pothuri Ramyamadhuri1 , Dasari Ravi Kumar2 #1Student of M. Tech(CSE) and #2 Asst. Prof, Department of Information Technology, QIS Institute of technology, Ongole. A.P, India. Abstract: The specialized difficulties in mobile devices are that these are heterogeneous as far as working frameworks; the malware taints the focused framework in any shrewd manner through the neighborhood and the worldwide integration, while the to-be-sent barrier framework then again would be normally asset restricted. Through hypothetical investigation and reenactments with both engineered and also reasonable versatility follows, we demonstrate that the circulated calculation accomplishes ideal arrangement, and performs effectively in all practical situations. As malware assaults turn out to be the more often in portable systems, conveying a productive guard framework to ensure against disease and to help the tainted hubs to recoup is imperative to avert genuine spreading and flare-ups. We display the barrier framework with reasonable suspicions tending to all the above difficulties that have not been tended to in past logical work. In the view of structure of improving the framework welfare utility, which is the weighted summation of individual utility relying upon the last number of tainted hubs through the mark portion, we propose an experience construct dispersed calculation situated in light of Metropolis sampler. In this paper, we investigate the issue of how to in a perfect world, pass on the substance based characteristics of malware, which serves to recognize the relating malware and weaken further multiplication, to minimize the amount of corrupted center points. Key Terms- Signature, Dissemination, Proximity malware, Heterogeneous mobile devices. I. Introduction: The systems are significantly focused on malware assaults. So far we've seen countless against individual PCs and different gadgets. Be that as it may, assaults progressively rely on upon network. Consider the accompanying illustrations. An office laborer snaps on a connection in email. This contaminates PC with malware that bargains different machines in her office by snooping passwords that go over the LAN. The reason she tapped on the connection is that the email originated from her mom. The malware had tainted her mom's machine and after that conveyed a duplicate of a late email, with itself connected, to everybody in mum's location book portable malware examples of more than 350 reported in mid-2007. This is fundamentally as a result of two reasons. One is the development of capable cell phones, for example, the iPhone, Blackberry, and Android gadgets, and progressively expanded portable applications, for example, Multimedia Messaging Service (MMS). A delay tolerant framework needs hardware that can store generous measure of data. Such media must have the ability to survive intensified power incident and after that system restarts. It must be rapidly accessible at whatever point we need. Flawless advances thus consolidate high-volume streak memory and hard drives. The data set away on these media must be dealt with and composed by programming which ensures exact and strong store-and-forward helpfulness. In a deferral tolerant framework, development can in like manner be requested in three ways i.e. encouraged, conventional and mass altogether of their lessening need. Encouraged packages are always transmitted, and affirmed before data of some different class from an offered source to a given destination. There are numerous assaults, and resistances, that develop once we have expansive quantities of machines arranged together. These rely on upon various components, the most critical of which are the conventions the system employments. A second arrangement of variables identify with the topology of the system: is each machine ready to contact each other machine, or does it just have direct access to a modest bunch of others? In our case over, an infection spreads itself through an informal community — starting with one companion then onto the next, much the same as the influenza infection II. Related Work: Various approaches for detecting network scanning have been proposed in the literature. The majority of these need to look only at the IP or TCP/UDP packet headersof the network track. Dierent subsets of header contents are analyzed by dierentscan detection mechanisms in order to infer scanning activity. While the analysisisusually depends on statistical models, there are machine learning based methods andvisual-based mechanisms. Few proposals correlate remote scanners to detect coordinated scans.Thus, we can assign a scanner as a host whichinitiates a single or multiple connection attempts destined to one or multiple ports inone or
  • 2.
    Assorted Strategy forthe Finest Malware Defense in Portable Set-Up DOI: 10.9790/0661-18118083 www.iosrjournals.org 81 | Page multiple destination hosts for the purpose of ending out if all or some of thetargeted ports are oaringaccessible network services or to and out if all or some ofthe targeted hosts are active. III. Network Attack And Defense: IPsec is widely used by firewall vendors who offer avirtual private networkfacility with their products; that is, by installing one of their boxes in eachbranch between the local LAN and the router, all the internal traffic can passencrypted over the Internet. Individual PCs, such as workers‟ laptops andhome PCs, can in theory join a VPN given a firewall that supports IPsec, butthis is harder than it looks. Compatibility has been a major problem withdifferent manufacturers‟ offerings just not working with each other; althoughfirewall-to- firewall compatibility has improved recently, getting random PCsto work with a given VPN is still very much a hit-or-miss affair.IPsec has the potential to stop some network attacks, and be a useful component in designing robust distributed systems. But it isn‟t a panacea. Indeed, virtual private networks exacerbate „deperimeterization‟ problem alreadydiscussed. If we have thousands ofmachines sitting in our employee‟shomes that are both in the network (as they connect via a VPN) and connectedto the Internet (as their browser talks to the Internet directly via the home‟scable modem) then they become a potential weak point. (Indeed, the U.S.Department of Justice ruled in 2007 that employees can‟t use their own PCs orPDAs for work purposes; all mobile devices used for departmental businessmust be centrally managed. IV. Algorithms i.Greedy algorithm This algorithm is the recursive algorithm. It follows a step by step procedure. This algorithm is used to increase the system welfare. System welfare is nothing but the sum of individual utilities with different weighing factors according to the final number of infected nodes. The algorithm repeatedly chooses signatures to store in the helpers: in each step, it tries to select one signature that brings the maximum system utility for a helper that still has enough storage. Therefore, our algorithm is likely to allocate more helpers to store the signatures of malware whose corresponding malware-defending utilities are larger than others, which is achieved by using the heterogeneous features in terms of devices and malware. The step by step procedure is as follows. i. Initially no helper has signature, number of helpers is zero and also system welfare is initially zero. ii. Initialize the set of malwares and set the sum to zero. iii. For every malware, calculate the system welfare. iv. While sum less than maximum number of signatures that can be stored in helpers and malware set is not empty, v. Select the signature i such that it brings maximum system utility. vi. And select the helper l such that maximum number of signatures can be stored in that. vii. Now set the new indicator that helper has signature to 1. viii. Update the number of helpers and sum. ix. Update the system welfare. x. Now if the number of helpers is greater than or equal to total number of helpers, xi. Then there will be a signature for every malware. xii. End while. ii.Encounter based distributed algorithm This algorithm is used to distribute the content based signatures. In this the nodes exchange their signatures when they encounter with each other based on some conditions. So we consider every encounter between any two helpers as one step of configuration changing in the algorithm. Consider the two nodes i,j, when nodes i and j meet, each one adjusts its current configuration according to the others. More specifically, one node, say i, randomly chooses a signature in its own buffer, and randomly chooses another one that is not in its buffer but in the buffer of node j to replace the chosen signature, which comes to a tentative configuration. The distributed algorithm of signature distribution for Node i to adjust its configuration when encountering Node j is as follows. i. Intially check whether the two nodes i,j are having same signatures. ii. If yes, then end the process. Since there is no need to exchange the signatures. iii. Otherwise, if there is at least one signature existing in node j, but does not exists in node i, iv. Then add one to the encounter counter, say n which counts every encounter between the nodes. v. Now select a signature c from the buffer of node i uniform randomly such that node i have that signature. And select a signature c1 from the buffer of node j uniform randomly such that the signature is present only in the buffer of node j but not in node i. vi. Now set the system temperature to Tn .
  • 3.
    Assorted Strategy forthe Finest Malware Defense in Portable Set-Up DOI: 10.9790/0661-18118083 www.iosrjournals.org 82 | Page vii. Now compute the acceptance probability for the node i to accept that signature. viii. Draw a random number R uniform distributed in (0,1]; ix. If that random number is less than the acceptance probability then, x. Node i selects signature c1 and drops c. V. Performance Evaluation Centralized Greedy Algorithm In this section, we present numerical results with the goal ofdemonstrating that our greedyalgorithm for signaturedistribution, denoted OPT, achieves the optimal solution and yields significant enhancement on the system welfarecompared with prior heuristic algorithms.The simulation results are shown in Fig.1(a) and 1(b). Fig. 1a shows the number of infected nodes according to the malware recovering rates caused by the signature distribution in the greedy algorithm. We can observe that the number of infected nodes decreases with the increase of recovering rate. Among different algorithms, IF provides the worst performance.Fig. 1b shows thenumber of infected nodes according to the malwarespreading rates. Different from Fig. 1a, the number ofinfected nodes increases with the growth of spreading rate.From these results, we can observe that PA obtains relatively better performance than FI and UR, which are expected to underperform. 1a) variable malware recovering rate; and 1(b) variable malware spreading rate Mobility Model Simulation we measure the malware infected ratio of nodes againsttime, and the obtained results under the SWIM and SLAWmobility models are shown in Fig. 2a and 2b, respectively.From the results, we can observe that the greedy algorithm performs better than the distributed algorithm when the time is short. But the distributed algorithm approaches the performance of the greedy algorithm with the increase of the time. When the time is longer enough, these two schemes have the same performance. Therefore, we can conclude that our distribution algorithm approaches the optimal system performance. Fig 2(a) and 2(b): System performance of malware infected ratio under different mobility models of (a) SWIM, and (b) SLAW VI. Conclusion We have described a framework for developing and deploying a global crowd sourced defensive network to make auto mated network based threat detection, information sharing, and defense accessible to the
  • 4.
    Assorted Strategy forthe Finest Malware Defense in Portable Set-Up DOI: 10.9790/0661-18118083 www.iosrjournals.org 83 | Page masses. As malicious actors continue to find innovative ways to wreak havoc against unsuspecting internet users on an unprecedented scale, the need for a more panoramic view of network based threats is clear. It is also clear to us that cooperative defense strategies hold the most hope for the effective defense against numerouscooperative aggressors. While the large commercial organizations such as major software vendors stand to gain less defensive benefit from participation in a CODON than home the end users , their reputations are likely to improve as their customers and potential customers benefit from timely threat information sharing and a history of being a “good neighbor” in the wild and dangerous internet. We believe that even a low CODON participation rate can have a noticeable positive effect on the internet by providing quick and actionable intelligence to those system administrators with the unique resources and specialized tools necessary for mitigating distributed attacks. Even the formation of many small CODONs based on differing geopolitical, ideological, and commercial motivators would provide a benefit to the larger internet community as different “neighborhoods” of the internet become safer. References [1] P. Wang, M. Gonzalez, C. Hidalgo, and A. Barabasi, “Understanding the Spreading Patterns of Mobile Phone Viruses,” Science, vol. 324, no. 5930, pp. 1071-1076, 2009. [2] M. Hypponen, “Mobile Malwar,” Proc. 16th USENIX Security Symp., 2007. [3] M. Khouzani, S. Sarkar, and E. Altman, “Maximum Damage Malware Attack in Mobile Wireless Networks,” Proc. IEEE INFOCOM, 2010. [4] Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, “A Social Network Based Patching Scheme for Worm Containment in Cellular Networks,” Proc. IEEE INFOCOM, 2009. [5] G. Zyba, G. Voelker, M. Liljenstam, A. Me´hes, and P. Johansson, “Defending Mobile Phones from Proximity Malware,” Proc. IEEE INFOCOM, 2009. [6] F. Li, Y. Yang, and J. Wu, “CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-Based Mobile Networks,” Proc. IEEE INFOCOM, 2009. [7] M. Grossglauser and D. Tse, “Mobility Increases The Capacity of Ad-Hoc Wireless Networks,” Proc. IEEE INFOCOM, pp. 1360- 1369, 2001. [8] R. May and A. Lloyd, “Infection Dynamics on Scale-Free Networks,” Physical Rev. E, vol. 64, no. 6, p. 066112, 2001. [9] E. Altman, G. Neglia, F. De Pellegrini, and D. Miorandi, “Decentralized Stochastic Control of Delay Tolerant Networks,” Proc. IEEE INFOCOM, 2009. [10] M. Khouzani, S. Sarkar, and E. Altman, “Dispatch then Stop: Optimal Dissemination of Security Patches in Mobile Wireless Networks,” Proc. IEEE 49th Conf. Decision and Control (CDC), pp. 2354-2359, 2010. AUTHORS: POTHURI RAMYA MADHURI is Pursuing M.Tech (ComputerScience and Engineering) from QIS Institute of Technology, Prakasam Dist, Andhra Pradesh, India. DASARI RAVIKUMAR currently working as Asst.Professor in QIS Institute of Technology, in the Department of Information Technology, Ongole, Prakasam Dist, Andhra Pradesh, India.