Modeling propagation and immunization of passive worms in peer-to-peer networks

被引:0
|
作者
机构
[1] [1,2,Feng, Chao-Sheng
[2] Qin, Zhi-Guang
[3] Yuan, Ding
[4] Qing, Yu
来源
Feng, C.-S. (csfenggy@126.com) | 1600年 / Chinese Institute of Electronics卷 / 41期
关键词
Chitosan - Immunization - Computer system recovery - Distributed computer systems;
D O I
10.3969/j.issn.0372-2112.2013.05.009
中图分类号
学科分类号
摘要
In this paper, we identified the features of passive worm. Further the models of propagation and immunization of passive worms are proposed in the mean-field methods. Based on the model of worm propagation and Epidemiology, the sufficient condition for the global stability of the worm free equilibrium is deduced. Simulations validate the condition. Both the sufficient condition and all the experiment results show that amongst all P2P-related factors having effect on passive wormpropagation, attack performance of passive worms is most sensitive to two P2P system parameters: the download rate and the recovery rate. Controlling the two parameters, i. e. decreasing the download rate and increasing the recovery rate, provides an effective means for throttling the spread of passive worms.
引用
收藏
相关论文
共 50 条
  • [31] Peer-to-peer traffic in metro networks: Analysis, modeling, and policies
    Hamada, T
    Chujo, K
    Chujo, T
    Yang, X
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 425 - 438
  • [32] Peer-to-Peer Networks 2
    Lin Yu 1
    2. Peking University
    ZTECommunications, 2006, (02) : 61 - 64
  • [33] Butterflies and peer-to-peer networks
    Datar, M
    ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 310 - 322
  • [34] COOPERATION IN PEER-TO-PEER NETWORKS
    Gradowski, Tomasz
    Mrowinski, Maciej J.
    Kosinski, Robert A.
    ACTA PHYSICA POLONICA B, 2010, 41 (05): : 1143 - 1149
  • [35] SIL: Modeling and measuring scalable peer-to-peer search networks
    Cooper, BF
    Garcia-Molina, H
    DATABASES, INFORMATION SYSTEMS, AND PEER-TO-PEER COMPUTING, 2004, 2944 : 2 - 16
  • [36] An update propagation strategy considering access frequency in peer-to-peer networks
    Watanabe, Toshiki
    Kanzaki, Akimitsu
    Hara, Takahiro
    Nishio, Shojiro
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2008, 4947 : 661 - 669
  • [37] Analyzing Impacts of Software Diversity on Worm Propagation in Peer-to-Peer Networks
    Zhou, Ying
    Wu, Zhong-fu
    Li, Feng
    Wang, Hao
    Zhu, Zheng-zhou
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 219 - 225
  • [38] Modeling Peer-to-Peer Networks with Interest-Based Clusters
    Forstner, Bertalan
    Charaf, Hassan
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 38 - 43
  • [39] Tracerouting peer-to-peer networks
    Liu, WL
    Boutaba, R
    Monitoring Internet Traffic and Services, 2005, : 101 - 114
  • [40] Searching in peer-to-peer networks
    Klampanos, Iraklis A.
    Jose, Joemon M.
    COMPUTER SCIENCE REVIEW, 2012, 6 (04) : 161 - 183