Modeling propagation and immunization of passive worms in peer-to-peer networks

被引:0
|
作者
机构
[1] [1,2,Feng, Chao-Sheng
[2] Qin, Zhi-Guang
[3] Yuan, Ding
[4] Qing, Yu
来源
Feng, C.-S. (csfenggy@126.com) | 1600年 / Chinese Institute of Electronics卷 / 41期
关键词
Chitosan - Immunization - Computer system recovery - Distributed computer systems;
D O I
10.3969/j.issn.0372-2112.2013.05.009
中图分类号
学科分类号
摘要
In this paper, we identified the features of passive worm. Further the models of propagation and immunization of passive worms are proposed in the mean-field methods. Based on the model of worm propagation and Epidemiology, the sufficient condition for the global stability of the worm free equilibrium is deduced. Simulations validate the condition. Both the sufficient condition and all the experiment results show that amongst all P2P-related factors having effect on passive wormpropagation, attack performance of passive worms is most sensitive to two P2P system parameters: the download rate and the recovery rate. Controlling the two parameters, i. e. decreasing the download rate and increasing the recovery rate, provides an effective means for throttling the spread of passive worms.
引用
收藏
相关论文
共 50 条
  • [1] Propagation modeling and analysis of passive worms in peer-to-peer file-sharing networks
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Cuthbet, Laurence
    Tokarchuk, Laurissa
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (02): : 262 - 265
  • [2] Modeling the propagation of Peer-to-Peer worms
    Fan, Xiang
    Xiang, Yang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2010, 26 (08): : 1433 - 1443
  • [3] Propagation Modeling of Peer-to-Peer Worms
    Fan, Xiang
    Xiang, Yang
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 1128 - 1135
  • [4] Modeling and defending passive worms over unstructured peer-to-peer networks
    Wang F.
    Zhang Y.
    Ma J.
    Transactions of Tianjin University, 2008, 14 (1) : 66 - 072
  • [5] Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks
    王方伟
    张运凯
    马建峰
    Transactions of Tianjin University, 2008, (01) : 66 - 72
  • [6] Modeling the Propagation of Peer-to-Peer Worms under Quarantine
    Fan, Xiang
    Xiang, Yang
    PROCEEDINGS OF THE 2010 IEEE-IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2010, : 942 - 945
  • [7] Modeling passive worm propagation in peer-to-peer system
    Ma, Jie
    Chen, Xinmeng
    Xiang, Guangli
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1129 - 1132
  • [8] Modelling and analyzing passive worms over unstructured peer-to-peer networks
    Wang, Fangwei
    Zhang, Yunkai
    Ma, Jianfeng
    International Journal of Network Security, 2010, 11 (01) : 39 - 45
  • [9] Modeling of virus propagation in the mobile peer-to-peer networks
    Feng, C.-S., 1600, Univ. of Electronic Science and Technology of China (41):
  • [10] Modeling and defending against adaptive bittorrent worms in peer-to-peer networks
    1600, Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States (09):