Propagation of Active Worms in P2P Networks: Modeling and Analysis

被引:0
|
作者
Tang, Haokun [1 ]
Lu, Yukui [2 ]
Zhu, Shitong [3 ]
Huang, Jun [3 ]
机构
[1] Southwest Univ, Coll Econ & Management, Chongqing, Peoples R China
[2] Yiling Pharmaceut Co LTD, Shijiazhuang, Hebei, Peoples R China
[3] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing, Peoples R China
基金
中国博士后科学基金;
关键词
active worm; dynamic feature; propagation; model; P2P networks;
D O I
10.4304/jcp.9.11.2514-2524
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Active worms, a category of self-replicating malicious programs which could spread in an automated fashion and flood particular Peer-to-Peer (P2P) networks within very short time, have drawn significant attention. However, only limited number of studies focus on propagation model of active worms with fair consideration of P2P nodes' dynamic features consisting of P2P churn, random quarantine, regular immunization, dynamic fragmentation and etc. This paper proposes three propagation models of active worms under dynamic P2P environment, conducts a mathematical analysis on the propagation of active worms under presented models and provides extensive numerical studies to the impact of relevant parameters on active worms' propagation speed under dynamic P2P environment. Models presented in this paper are simple, effective and thus applicable for defending against active worms in real P2P networks.
引用
收藏
页码:2514 / 2524
页数:11
相关论文
共 50 条
  • [31] FPM: Four-factors Propagation Model for passive P2P worms
    Chen, Ting
    Zhang, Xiao-song
    Wu, Yue
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 133 - 141
  • [32] A Computer Virus Propagation Model in P2P Networks
    Liu, Ming
    Han, Lansheng
    Hong, Fan
    Zou, Mengsong
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 578 - 581
  • [33] P2P worm Propagation modeling and analysis under dynamic quarantine defense
    Yang, Wei
    Li, Yong
    Chang, Gui-ran
    Yao, Yu
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 60 - 63
  • [34] Modeling and analysis of random walk search algorithms in P2P networks
    Bisnik, N
    Abouzeid, A
    SECOND INTERNATIONAL WORKSHOP ON HOT TOPICS IN PEER-TO-PEER SYSTEMS, PROCEEDINGS, 2005, : 95 - 103
  • [35] Modeling and Analysis of Large Scale Interconnected Unstructured P2P Networks
    Gaeta, Rossano
    Loti, Riccardo
    Ciancaglini, Vincenzo
    Liquori, Luigi
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 710 - +
  • [36] Performance analysis of passive worms over unstructured P2P network
    Key Laboratory of Computer Networks and Information Security of the Education Ministry, Xidian University, Xi'an 710071, China
    不详
    Jilin Daxue Xuebao (Gongxueban), 2009, 4 (1069-1074):
  • [37] A new trust propagation and aggregation method for P2P networks
    Yuan, FuYong
    Li, Hong
    Fu, Qianqian
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1176 - 1181
  • [38] Evolutionary Proactive P2P Worm: Propagation Modeling and Simulation
    Zhang, Yejiang
    Li, Zhitang
    Hu, Zhengbing
    Huang, Qingfeng
    Lu, Chuiwei
    SECOND INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING: WGEC 2008, PROCEEDINGS, 2008, : 261 - 264
  • [39] Modeling and analysis of passive worm propagation in the P2P file-sharing network
    Feng, Chao-sheng
    Yang, Jun
    Qin, Zhi-guang
    Yuan, Ding
    Cheng, Hong-rong
    SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 : 87 - 99
  • [40] Modeling and Analysis of PeerTrust-Like Trust Mechanisms in P2P Networks
    Wang Miao
    Xu Zhijun
    Zhang Yujun
    Zhang Hongmei
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 2689 - 2694