Propagation Modeling of Peer-to-Peer Worms

被引:8
|
作者
Fan, Xiang [1 ]
Xiang, Yang [1 ]
机构
[1] Cent Queensland Univ, Ctr Intelligent & Networked Syst, Sch Management & Informat Syst, Rockhampton, Qld 4702, Australia
关键词
modeling; peer-to-peer; propagation; worms;
D O I
10.1109/AINA.2010.96
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security because of P2P worms' increasing complexity and sophistication, significant damages their propagation can cause, and recent popularity of P2P networks with increasing number of users. No existing work has solved the problem of propagation modeling of P2P worms due to its complexity. This paper presents a study on propagation modeling of P2P worms. It also presents our applications of the proposed approach in worm propagation research. Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms, and demonstrate the approach's ease of employment through the simulation experiments; and secondly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks, and a critical value of vulnerability rate. The proposed discrete-time deterministic propagation model of a P2P worm is written in a difference equation of logic matrix. To the best of our knowledge, we are the first using logic matrix in network security research in general and worm propagation research in particular. The proposed approach's ease of employment makes it an attractive instrument to conduct worm propagation research.
引用
收藏
页码:1128 / 1135
页数:8
相关论文
共 50 条
  • [41] Effects of knowledge base quality on peer-to-peer information propagation
    Gibson, Michael
    Vasconcelos, Wamberto W.
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 350 - 357
  • [42] Automated peer-to-peer security-update propagation network
    Tamin, Zakiya M.
    PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 555 - +
  • [43] Sharing communities experiences for query propagation in peer-to-peer systems
    Lumineau, N
    Doucet, A
    INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2004, : 246 - 253
  • [44] Goal Based Threat Modeling for Peer-to-Peer Cloud
    De, Sanghamitra
    Barik, Mridul Sankar
    Banerjee, Indrajit
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 64 - 72
  • [45] Dynamic Modeling of Peer-to-Peer Power Market Making
    Ettlin, Adrian
    2018 15TH INTERNATIONAL CONFERENCE ON THE EUROPEAN ENERGY MARKET (EEM), 2018,
  • [46] Modeling group trust for peer-to-peer access control
    Gummadi, A
    Yoon, JP
    15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 971 - 978
  • [47] Measurement and modeling of the peer-to-peer sharing objects popularity
    Guo, Zhen-Bin
    Qiu, Zheng-Ding
    Tongxin Xuebao/Journal on Communication, 2009, 30 (03): : 66 - 74
  • [48] Integrated modeling of the peer-to-peer markets in the energy industry
    Alvarez, Gonzalo E.
    INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING COMPUTATIONS, 2022, 13 (01) : 101 - 118
  • [49] Modeling Peer-to-Peer Connections over a Smartphone Network
    Berta, Arpad
    Szabo, Zoltan
    Jelasity, Mark
    DICG'20: PROCEEDINGS OF THE 2020 1ST INTERNATIONAL WORKSHOP ON DISTRIBUTED INFRASTRUCTURE FOR COMMON GOOD, 2020, : 43 - 48
  • [50] Peer-to-Peer Based Intrusion Detection Modeling and Analysis
    Zhang Xiaosong
    Chen Ting
    Ma Yue
    Li Hua
    2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 213 - +