Propagation Modeling of Peer-to-Peer Worms

被引:8
|
作者
Fan, Xiang [1 ]
Xiang, Yang [1 ]
机构
[1] Cent Queensland Univ, Ctr Intelligent & Networked Syst, Sch Management & Informat Syst, Rockhampton, Qld 4702, Australia
来源
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) | 2010年
关键词
modeling; peer-to-peer; propagation; worms;
D O I
10.1109/AINA.2010.96
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security because of P2P worms' increasing complexity and sophistication, significant damages their propagation can cause, and recent popularity of P2P networks with increasing number of users. No existing work has solved the problem of propagation modeling of P2P worms due to its complexity. This paper presents a study on propagation modeling of P2P worms. It also presents our applications of the proposed approach in worm propagation research. Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms, and demonstrate the approach's ease of employment through the simulation experiments; and secondly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks, and a critical value of vulnerability rate. The proposed discrete-time deterministic propagation model of a P2P worm is written in a difference equation of logic matrix. To the best of our knowledge, we are the first using logic matrix in network security research in general and worm propagation research in particular. The proposed approach's ease of employment makes it an attractive instrument to conduct worm propagation research.
引用
收藏
页码:1128 / 1135
页数:8
相关论文
共 50 条
  • [31] Management of peer-to-peer overlays
    Buford, John F.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2008, 3 (01) : 2 - 12
  • [32] Peer to Peer Wireless Propagation Measurements and Path-Loss Modeling in Vegetated Environments
    Antonio Gay-Fernandez, Jose
    Cuinas, Inigo
    IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2013, 61 (06) : 3302 - 3311
  • [33] Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique
    Gaeta, Rossano
    Grangetto, Marco
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (10) : 1994 - 2003
  • [34] Research on Simulators for Peer-to-Peer Systems
    Zhou, Shijie
    Zhou, Yanghong
    Luo, Jiaqing
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 726 - 731
  • [35] Peer-to-Peer Application Threat Investigation
    Mahdy, Mohamed
    SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 642 - 650
  • [36] Proportional replication in peer-to-peer networks
    Tewari, Saurabh
    Kleinrock, Leonard
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 556 - 567
  • [37] Peer-to-peer content distribution solution
    Sugyo, Kazushi
    Ochiai, Takayoshi
    NEC TECHNICAL JOURNAL, 2006, 1 (01): : 24 - 27
  • [38] Child pornography in peer-to-peer networks
    Steel, Chad M. S.
    CHILD ABUSE & NEGLECT, 2009, 33 (08) : 560 - 568
  • [39] Blogracy: A Peer-to-Peer Social Network
    Franchi, Enrico
    Poggi, Agostino
    Tomaiuolo, Michele
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2016, 7 (02) : 37 - 56
  • [40] Peer-to-Peer Research - Overview and Challenges
    Graffi, Kalman
    Kovacevic, Aleksandra
    Mukherjee, Patrick
    Benz, Michael
    Leng, Christof
    Bradler, Dirk
    Schroeder-Bernhardi, Julian
    Liebau, Nicolas
    IT-INFORMATION TECHNOLOGY, 2007, 49 (05): : 272 - 279