Propagation Modeling of Peer-to-Peer Worms

被引:8
|
作者
Fan, Xiang [1 ]
Xiang, Yang [1 ]
机构
[1] Cent Queensland Univ, Ctr Intelligent & Networked Syst, Sch Management & Informat Syst, Rockhampton, Qld 4702, Australia
来源
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2010年
关键词
modeling; peer-to-peer; propagation; worms;
D O I
10.1109/AINA.2010.96
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security because of P2P worms' increasing complexity and sophistication, significant damages their propagation can cause, and recent popularity of P2P networks with increasing number of users. No existing work has solved the problem of propagation modeling of P2P worms due to its complexity. This paper presents a study on propagation modeling of P2P worms. It also presents our applications of the proposed approach in worm propagation research. Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms, and demonstrate the approach's ease of employment through the simulation experiments; and secondly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks, and a critical value of vulnerability rate. The proposed discrete-time deterministic propagation model of a P2P worm is written in a difference equation of logic matrix. To the best of our knowledge, we are the first using logic matrix in network security research in general and worm propagation research in particular. The proposed approach's ease of employment makes it an attractive instrument to conduct worm propagation research.
引用
收藏
页码:1128 / 1135
页数:8
相关论文
共 50 条
  • [21] Detection and Classification of Peer-to-Peer Traffic: A Survey
    Gomes, Joao V.
    Inacio, Pedro R. M.
    Pereira, Manuela
    Freire, Mario M.
    Monteiro, Paulo P.
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [22] Outdoor-indoor propagation characteristics of peer-to-peer system at 5.25 GHz
    Lu, Yang
    Zhang, Jianhua
    Gao, Xinying
    Zhang, Ping
    Wu, Yufei
    2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, 2007, : 869 - +
  • [23] Reputation in peer-to-peer networks
    Hu, THT
    Wongrujira, K
    Sereviratne, A
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 1411 - 1415
  • [24] A Comparison of Peer-to-Peer Simulator
    Yan, Li
    MECHATRONICS AND INTELLIGENT MATERIALS III, PTS 1-3, 2013, 706-708 : 1716 - 1719
  • [25] A peer-to-peer simulation architecture
    Duvenhage, Bernardt
    le Roux, Willem H.
    21ST EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2007: SIMULATIONS IN UNITED EUROPE, 2007, : 684 - 690
  • [26] Dynamic peer-to-peer competition
    Caram, L. F.
    Caiafa, C. F.
    Proto, A. N.
    Ausloos, M.
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2010, 389 (13) : 2628 - 2636
  • [27] Diffusion on the Peer-to-Peer Network
    Riposo, Julien
    JOURNAL OF RISK AND FINANCIAL MANAGEMENT, 2022, 15 (02)
  • [28] Peer-to-peer direct sales
    Wierzbicki, A
    Fifth IEEE International Conference on Peer-to-Peer Computing, Proceedings, 2005, : 106 - 113
  • [29] Modeling and Analysis in Peer-To-Peer Botnet with Virtual Patching and Quarantine Strategy
    Yang, Wei
    Fu, Qiang
    Yao, Yu
    Sun, Wei
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [30] Challenges in peer-to-peer gaming
    Neumann, Christoph
    Prigent, Nicolas
    Varvello, Matteo
    Suh, Kyoungwon
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (01) : 79 - 82