Modeling propagation and immunization of passive worms in peer-to-peer networks

被引:0
|
作者
机构
[1] School of Computer Science, Sichuan Normal University, Chengdu
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu
[3] The No. 30 Institute of China Electronic Technology Corporation, Chengdu
来源
Feng, C.-S. (csfenggy@126.com) | 1600年 / Chinese Institute of Electronics卷 / 41期
关键词
Immunization; Modeling; P2P networks; Passive worms; Propagation; Simulations;
D O I
10.3969/j.issn.0372-2112.2013.05.009
中图分类号
学科分类号
摘要
In this paper, we identified the features of passive worm. Further the models of propagation and immunization of passive worms are proposed in the mean-field methods. Based on the model of worm propagation and Epidemiology, the sufficient condition for the global stability of the worm free equilibrium is deduced. Simulations validate the condition. Both the sufficient condition and all the experiment results show that amongst all P2P-related factors having effect on passive wormpropagation, attack performance of passive worms is most sensitive to two P2P system parameters: the download rate and the recovery rate. Controlling the two parameters, i. e. decreasing the download rate and increasing the recovery rate, provides an effective means for throttling the spread of passive worms.
引用
收藏
页码:884 / 889
页数:5
相关论文
共 19 条
  • [1] Xia C.-H., Shi Y.-P., Li X.-J., Research on epidemic modesl of P2P worms in structured peer-to-peer networks, Chinese Journal of Computers, 29, 7, pp. 952-959, (2006)
  • [2] Chen G., Gray R.S., Simulating non-scanning worms on peer-to-peer networks, Proc of the 1st Int Conf on Scalable Information Systems, (2006)
  • [3] Zhou L., Zhang L., McSherry F., Et al., A first look at peer-to-peer worms: Threats and defenses, Proc of the 4th Int Workshop on Peer-to-Peer Systems, pp. 24-35, (2005)
  • [4] Nassima K., Yannick C., Nazim A., The emerging threat of peer-to-peer worms, Proc of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation, pp. 18-20, (2006)
  • [5] Frauenthal J.C., Mathematical Modeling in Epidemiology, (1980)
  • [6] Driessche P., Watmough J., Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission, Mathematical Biosciences, 180, pp. 29-48, (2002)
  • [7] Arnio J., Davis J., Hartley D., Et al., A multi-species epidemic model with spatial dynamics, Mathematical Medicine and Biology, (2005)
  • [8] Diekmann O., Heesterbeek J.A.P., Mathematical Epidemiology of Infectious Diseases: Model Building, Analysis and Interpretation, (1999)
  • [9] Thommes R.W., Coates M.J., Modeling Virus Propagation in Peer-to-Peer Networks, (2005)
  • [10] Murray W.H., The application of epidemiology to computer viruses, Computers and Security, 7, pp. 130-150, (1988)