A random and scale-free hybrid P2P worm propagation model

被引:0
|
作者
Chen J.-H. [1 ,2 ]
Hu C.-Z. [1 ,2 ]
Shi F. [1 ]
Wei S.-J. [2 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology
[2] Lab for Computer Network Defense Technology, Beijing Institute of Technology
来源
Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science) | 2010年 / 38卷 / 05期
关键词
Network security; Node degree distribution; Propagation model; Random walk; Worm;
D O I
10.3969/j.issn.1000-565X.2010.05.016
中图分类号
学科分类号
摘要
In order to overcome the shortcomings of the existing models that use only the node degree distribution to construct the worm network, a worm propagation model with both random and preferential attachments is proposed, which considers both the property of scale-free network and the characteristics of real P2P network communication, and introduces a adjustment parameter representing the new node connection probability. Then, the evolution mechanism of the model is investigated based on the mean-field theory through Matlab simulation. Theoretical and simulated results show that the connection between the suitable nodes selected from the worm network and the newly-infected host is tightly related to the connection probability and the node attraction, and that the established worm network is scale-free.
引用
收藏
页码:80 / 85
页数:5
相关论文
共 13 条
  • [1] Zhou L.-D., Zhang L.-T., Mcsheery F., Et al., A first look at peer-to-peer worms: threats and defenses, Proceedings of Peer-to-Peer Systems 4th International Workshop (IPTPS05), pp. 24-35, (2005)
  • [2] Chen Z.-S., Gao L.-X., Kwiat K., Modeling the spread of active worms, Proceedings of Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, pp. 1890-1900, (2003)
  • [3] Wei Y., Analyze the worm-based attack in large scale P2P networks, Proceedings of the Eighth IEEE International Symposium on High Assurance Systems Engineering (HASE'04), pp. 308-309, (2004)
  • [4] Thommes R., Coates M., Epidemiological modeling of peer-to-peer viruses and pollution, Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM 2006), pp. 1-12, (2006)
  • [5] Ma J., Chen X.-M., Xiang G.-L., Modeling passive worm propagation in peer-to-peer system, Proceedings of 2006 International Conference on Computational Intelligence and Security, pp. 1129-1132, (2006)
  • [6] Barabasi A.L., Bonabeau E., Scale-free networks, Scientific American, 288, 5, pp. 60-69, (2003)
  • [7] Albert R., Barabasi A.L., Statistical mechanics of complex networks, Reviews of Modern Physics, 74, 1, pp. 47-97, (2002)
  • [8] Griffin C., Brooks R., A note on the spread of worms in scale-free networks, IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, 36, 1, pp. 198-202, (2006)
  • [9] Zhang Y.-J., Li Z.-T., Hu Z.-B., Et al., A P2P E-commerce related network security issue: P2P worm, Proceedings of 2008 International Symposium on Electronic Commerce and Security, pp. 114-117, (2008)
  • [10] Hong Z., Wu L.-F., Wang Y.-Y., Three worm propagation models to establish scale-free worm networks, Journal of Jilin University: Engineering and Technology Edition, 38, 3, pp. 690-694, (2008)