Propagation Modeling of Peer-to-Peer Worms

被引:8
|
作者
Fan, Xiang [1 ]
Xiang, Yang [1 ]
机构
[1] Cent Queensland Univ, Ctr Intelligent & Networked Syst, Sch Management & Informat Syst, Rockhampton, Qld 4702, Australia
关键词
modeling; peer-to-peer; propagation; worms;
D O I
10.1109/AINA.2010.96
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security because of P2P worms' increasing complexity and sophistication, significant damages their propagation can cause, and recent popularity of P2P networks with increasing number of users. No existing work has solved the problem of propagation modeling of P2P worms due to its complexity. This paper presents a study on propagation modeling of P2P worms. It also presents our applications of the proposed approach in worm propagation research. Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms, and demonstrate the approach's ease of employment through the simulation experiments; and secondly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks, and a critical value of vulnerability rate. The proposed discrete-time deterministic propagation model of a P2P worm is written in a difference equation of logic matrix. To the best of our knowledge, we are the first using logic matrix in network security research in general and worm propagation research in particular. The proposed approach's ease of employment makes it an attractive instrument to conduct worm propagation research.
引用
收藏
页码:1128 / 1135
页数:8
相关论文
共 50 条
  • [22] Modeling Unavailability in Peer-to-Peer Systems
    Menasche, Daniel Sadoc
    de Aragao Rocha, Antonio A.
    Li, Bin
    Towsley, Don
    Venkataramani, Arun
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 375 - +
  • [23] Modelling and analyzing passive worms over unstructured peer-to-peer networks
    Wang, Fangwei
    Zhang, Yunkai
    Ma, Jianfeng
    International Journal of Network Security, 2010, 11 (01) : 39 - 45
  • [24] Active Worm Propagation in Hierarchical Peer-to-Peer Network Management Systems: Modeling and Analysis
    Saadat, Zahra Zohoor
    Yousefi, Saleh
    Fathy, Mahmood
    COMMUNICATION AND NETWORKING, 2009, 56 : 58 - +
  • [25] CUP: Controlled update propagation in peer-to-peer networks
    Roussopoulos, M
    Baker, M
    USENIX ASSOCIATION PROCEEDINGS OF THE GENERAL TRACK, 2003, : 167 - 180
  • [26] Preventing Piracy Content Propagation in Peer-to-Peer Networks
    Zhang, Hongli
    Ye, Lin
    Shi, Jiantao
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 105 - 114
  • [27] Malware Propagation Modelling in Peer-to-Peer Networks: A Review
    Musa, Ahmad Sanda
    Almohannadi, Hamad
    Alhamar, Jassim
    2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (W-FICLOUD 2018), 2018, : 198 - 202
  • [28] Modeling of peer-to-peer traffic caching deployment
    Ye, Mingjiang
    Wu, Jianping
    Xu, Ke
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (01): : 110 - 113
  • [29] Performance modeling of mobile peer-to-peer systems
    Yan, L
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 133 - 142
  • [30] Modeling Patient Engagement in Peer-to-Peer Healthcare
    Sillence, Elizabeth
    Hardy, Claire
    Harris, Peter R.
    Briggs, Pam
    WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2014, : 481 - 486