Modeling propagation and immunization of passive worms in peer-to-peer networks

被引:0
|
作者
机构
[1] [1,2,Feng, Chao-Sheng
[2] Qin, Zhi-Guang
[3] Yuan, Ding
[4] Qing, Yu
来源
Feng, C.-S. (csfenggy@126.com) | 1600年 / Chinese Institute of Electronics卷 / 41期
关键词
Chitosan - Immunization - Computer system recovery - Distributed computer systems;
D O I
10.3969/j.issn.0372-2112.2013.05.009
中图分类号
学科分类号
摘要
In this paper, we identified the features of passive worm. Further the models of propagation and immunization of passive worms are proposed in the mean-field methods. Based on the model of worm propagation and Epidemiology, the sufficient condition for the global stability of the worm free equilibrium is deduced. Simulations validate the condition. Both the sufficient condition and all the experiment results show that amongst all P2P-related factors having effect on passive wormpropagation, attack performance of passive worms is most sensitive to two P2P system parameters: the download rate and the recovery rate. Controlling the two parameters, i. e. decreasing the download rate and increasing the recovery rate, provides an effective means for throttling the spread of passive worms.
引用
收藏
相关论文
共 50 条
  • [41] Taxonomy-based conceptual modeling for peer-to-peer networks
    Tzitzikas, Y
    Meghini, C
    Spyratos, N
    CONCEPTUAL MODELING - ER 2003, PROCEEDINGS, 2003, 2813 : 446 - 460
  • [42] Empirical Modeling of Nomadic Peer-to-Peer Networks in Office Environment
    Oestges, Claude
    Castiglione, Paolo
    Czink, Nicolai
    2011 IEEE 73RD VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2011,
  • [43] SIL: Modeling and measuring scalable peer-to-peer search networks
    Cooper, Brian F.
    Garcia-Molina, Hector
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 2944 : 2 - 16
  • [44] Simulating Peer-to-Peer Networks
    Dhurandher, Sanjay K.
    Misra, Sudip
    Obaidat, Mohammad S.
    Singh, Inderpreet
    Agarwal, Raghu
    Bhambhani, Bhuvnesh
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 336 - +
  • [45] System Modeling for Priority Schemes in Managed Peer-to-Peer Networks
    Rivero-Angeles, Mario E.
    Yolanda Orea-Flores, Izlian
    COMPUTACION Y SISTEMAS, 2018, 22 (02): : 685 - 716
  • [46] Peer-to-peer networks in action
    Gong, L
    IEEE INTERNET COMPUTING, 2002, 6 (01) : 37 - 39
  • [47] Peer-to-Peer Accommodation Networks
    Pappas, Nikolaos
    TOURISM MANAGEMENT, 2019, 74 : 425 - 425
  • [48] Reputation in peer-to-peer networks
    Hu, THT
    Wongrujira, K
    Sereviratne, A
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 1411 - 1415
  • [49] JXTA & peer-to-peer networks
    Li, S
    DR DOBBS JOURNAL, 2003, 28 (06): : 30 - +
  • [50] Modeling Peer-to-Peer Botnets
    Van Ruitenbeek, Elizabeth
    Sanders, William H.
    QUANTITATIVE EVALUATION OF SYSTEMS: QEST 2008, PROCEEDINGS, 2008, : 307 - +