![starcraft brood war maps starcraft brood war maps](https://www.pcrisk.com/images/stories/screenshots201908/worm-homepage.jpg)
With the vigorous development of the mobile network environment, mobile phones become more and more popular, and mobile malicious code also gradually shows the trend of the outbreak. Because of the Code Red worm events and the outbreak of the Slammer worm, people have updated their knowledge of the great harmfulness of the worm. Worms are malicious codes with the featrues of autonomous replication and self-propagation in a network. Faced with the wide variety of malicious viruses transmitted infections way, we need to adopt equally effective way to keep the security of mobile network environment. The trends suggest that, in the current network security situation, businesses and consumers should continue to strengthen their security, including network security measures to ensure the security and order of the network environment. Latest security report shows that the number of traditional virus remains stable, while the mobile device virus has increased dramatically, with nearly 50 times comparing to last year. The increasingly complex mobile network environment brings us convenience, as well as various temptations and threats. In recent years, with the widespread of smartphone, Android, IOS, and other operating systems have occupied a certain market share in the mobile phone market. This control mechanism for benign worm propagation is of guiding significance to control the network security. Finally, we use simulation to verify the model. Considering whether the existence of benign worm, we simplified the model and analyzed the four situations.
![starcraft brood war maps starcraft brood war maps](https://mobilecomputerrepairservice.com/wp-content/uploads/2020/02/Different-Types-of-Computer-Viruses-300x225.jpg)
The control process of mobile benign worms is divided into two stages: the first stage is rapid repair control, which uses active benign worm to deal with malicious worm in the mobile network when the network is relatively stable, it enters the second stage of postrepair and uses passive mode to optimize the environment for the purpose of controlling the mobile network. In this paper, we focused on the spread of worm in mobile environment and proposed the benign worm control and repair mechanism. The development of benign worms, especially active benign worms and passive benign worms, has become a new network security measure. The traditional antivirus technologies have become powerless when facing mobile networks. Mobile smartphones generally promote the development of mobile network. Both in traditional social network and in mobile network environment, the worm is a serious threat, and this threat is growing all the time.