Propagation Modeling of Peer-to-Peer Worms

被引:8
|
作者
Fan, Xiang [1 ]
Xiang, Yang [1 ]
机构
[1] Cent Queensland Univ, Ctr Intelligent & Networked Syst, Sch Management & Informat Syst, Rockhampton, Qld 4702, Australia
来源
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2010年
关键词
modeling; peer-to-peer; propagation; worms;
D O I
10.1109/AINA.2010.96
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security because of P2P worms' increasing complexity and sophistication, significant damages their propagation can cause, and recent popularity of P2P networks with increasing number of users. No existing work has solved the problem of propagation modeling of P2P worms due to its complexity. This paper presents a study on propagation modeling of P2P worms. It also presents our applications of the proposed approach in worm propagation research. Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms, and demonstrate the approach's ease of employment through the simulation experiments; and secondly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks, and a critical value of vulnerability rate. The proposed discrete-time deterministic propagation model of a P2P worm is written in a difference equation of logic matrix. To the best of our knowledge, we are the first using logic matrix in network security research in general and worm propagation research in particular. The proposed approach's ease of employment makes it an attractive instrument to conduct worm propagation research.
引用
收藏
页码:1128 / 1135
页数:8
相关论文
共 50 条
  • [1] Modeling the propagation of Peer-to-Peer worms
    Fan, Xiang
    Xiang, Yang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2010, 26 (08): : 1433 - 1443
  • [2] Modeling the Propagation of Peer-to-Peer Worms under Quarantine
    Fan, Xiang
    Xiang, Yang
    PROCEEDINGS OF THE 2010 IEEE-IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2010, : 942 - 945
  • [3] Modeling propagation and immunization of passive worms in peer-to-peer networks
    Feng, C.-S. (csfenggy@126.com), 1600, Chinese Institute of Electronics (41): : 884 - 889
  • [4] Modeling of virus propagation in the mobile peer-to-peer networks
    Feng, C.-S., 1600, Univ. of Electronic Science and Technology of China (41): : 98 - 103
  • [5] The Probability Model of Peer-to-Peer Botnet Propagation
    Wang, Yini
    Wen, Sheng
    Zhou, Wei
    Zhou, Wanlei
    Xiang, Yang
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT I: ICA3PP 2011, 2011, 7916 : 470 - 480
  • [6] Malware Propagation Modelling in Peer-to-Peer Networks: A Review
    Musa, Ahmad Sanda
    Almohannadi, Hamad
    Alhamar, Jassim
    2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (W-FICLOUD 2018), 2018, : 198 - 202
  • [7] Modeling and evaluating of typical advanced peer-to-peer botnet
    Han, Qinting
    Yu, Wenqiu
    Zhang, Yaoyao
    Zhao, Zhiwen
    PERFORMANCE EVALUATION, 2014, 72 : 1 - 15
  • [8] A modeling framework of content pollution in Peer-to-Peer video streaming systems
    Yang, Sirui
    Jin, Hai
    Li, Bo
    Liao, Xiaofei
    COMPUTER NETWORKS, 2009, 53 (15) : 2703 - 2715
  • [9] Eliminating clustering in the propagation tree of semantic Peer-to-Peer networks
    Forstner, B
    Kereskényi, R
    Charaf, H
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2006, : 111 - +
  • [10] Automated peer-to-peer security-update propagation network
    Tamin, Zakiya M.
    PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 555 - +