Propagation of Active Worms in P2P Networks: Modeling and Analysis

被引:0
|
作者
Tang, Haokun [1 ]
Lu, Yukui [2 ]
Zhu, Shitong [3 ]
Huang, Jun [3 ]
机构
[1] Southwest Univ, Coll Econ & Management, Chongqing, Peoples R China
[2] Yiling Pharmaceut Co LTD, Shijiazhuang, Hebei, Peoples R China
[3] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing, Peoples R China
基金
中国博士后科学基金;
关键词
active worm; dynamic feature; propagation; model; P2P networks;
D O I
10.4304/jcp.9.11.2514-2524
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Active worms, a category of self-replicating malicious programs which could spread in an automated fashion and flood particular Peer-to-Peer (P2P) networks within very short time, have drawn significant attention. However, only limited number of studies focus on propagation model of active worms with fair consideration of P2P nodes' dynamic features consisting of P2P churn, random quarantine, regular immunization, dynamic fragmentation and etc. This paper proposes three propagation models of active worms under dynamic P2P environment, conducts a mathematical analysis on the propagation of active worms under presented models and provides extensive numerical studies to the impact of relevant parameters on active worms' propagation speed under dynamic P2P environment. Models presented in this paper are simple, effective and thus applicable for defending against active worms in real P2P networks.
引用
收藏
页码:2514 / 2524
页数:11
相关论文
共 50 条
  • [21] Propagation Analysis of Malware Families in Mobile P2P Networks
    Adeel, M.
    Tokarchuk, L. N.
    Azam, M. A.
    Khan, S. K. A.
    Khalil, M. A.
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 220 - 226
  • [22] A Holistic Immune System Against Active P2P Worms
    Lua, Eng Keong
    Chen, Ruichuan
    2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [23] Modeling and Analysis of Self-stopping BT Worms Using Dynamic Hit List in P2P Networks
    Luo, Jiaqing
    Xiao, Bin
    Liu, Guobin
    Xiao, Qingjun
    Zhou, Shijie
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5, 2009, : 3155 - +
  • [24] Fast quarantining of proactive worms in unstructured P2P networks
    Chen, Ting
    Zhang, Xiao-song
    Li, Hua
    Li, Xiong-da
    Wu, Yue
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1648 - 1659
  • [25] Propagation Model of Reputation in P2P Networks
    Sun, Hua
    Li, Li
    Yang, Wenzhong
    Qian, Yurong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 368 - +
  • [26] Modeling Churn in P2P networks
    Herrera, Octavio
    Znati, Taieb
    40TH ANNUAL SIMULATION SYMPOSIUM, PROCEEDINGS, 2007, : 33 - +
  • [27] Modeling and analysis of anti-worm in P2P networks
    TANG XinWANG RuchuanSHAO Xing College of ComputerNanjing University of Posts and TelecommunicationsNanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor NetworksNanjing China Key Lab of Broadband Wireless Communication and Sensor Network TechnologyNanjing University of Posts and TelecommunicationsMinistry of EducationNanjing China
    The Journal of China Universities of Posts and Telecommunications, 2012, 19 (01) : 112 - 118
  • [29] Modeling and analysis of anti-worm in P2P networks
    Tang, Xin
    Wang, Ru-Chuan
    Shao, Xing
    Journal of China Universities of Posts and Telecommunications, 2012, 19 (01): : 112 - 118
  • [30] Research and Development of P2P Worms
    Li You and Zhi-Guang Qin the School of Computer Science and Engineering
    Journal of Electronic Science and Technology, 2011, 9 (03) : 202 - 210