Modeling the propagation of Peer-to-Peer worms

被引:27
作者
Fan, Xiang [2 ]
Xiang, Yang [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[2] Cent Queensland Univ, Sch Management & Informat Syst, Rockhampton, Qld 4702, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2010年 / 26卷 / 08期
关键词
Network security; Invasive software; Worms; Peer-to-Peer; Propagation; Modeling; Defense;
D O I
10.1016/j.future.2010.04.009
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security research because of P2P worms' increasing complexity and sophistication. Due to the complexity of the problem, no existing work has solved the problem of modeling the propagation of P2P worms, especially when quarantine of peers is enforced. This paper presents a study on modeling the propagation of P2P worms. It also presents our applications of the proposed approach in worm propagation research. Motivated by our aspiration to invent an easy-to-employ instrument for worm propagation research, the proposed approach models the propagation processes of P2P worms by difference equations of a logic matrix, which are essentially discrete-time deterministic propagation models of P2P worms. To the best of our knowledge, we are the first using a logic matrix in network security research in general and worm propagation modeling in particular. Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms under three different conditions; secondly, we find the impacts of two different topologies on a P2P worm's attack performance; thirdly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks; and fourthly, we find the impacts of the two different quarantine tactics on the propagation characteristics of P2P worms in unstructured P2P networks. The approach's ease of employment, which is demonstrated by its applications in our simulation experiments, makes it an attractive instrument to conduct worm propagation research. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:1433 / 1443
页数:11
相关论文
共 21 条
[1]  
ANDERSON R M, 1991
[2]  
Andersson H., 2012, STOCHASTIC EPIDEMIC, V151
[3]  
Arce I., 2003, IEEE Security & Privacy, V1, P82, DOI 10.1109/MSECP.2003.1177002
[4]  
Bailey N.J.T., 1975, MATH THEORY INFECT D
[5]  
Chen ZS, 2005, GLOB TELECOMM CONF, P1779
[6]  
Chen ZS, 2003, IEEE INFOCOM SER, P1890
[7]   Risk factors for fatal candidemia caused by Candida albicans and non-albicans Candida species -: art. no. 22 [J].
Cheng, MF ;
Yang, YL ;
Yao, TJ ;
Lin, CY ;
Liu, JS ;
Tang, RB ;
Yu, KW ;
Fan, YH ;
Hsieh, KS ;
Ho, M ;
Lo, HJ .
BMC INFECTIOUS DISEASES, 2005, 5 (1)
[8]  
FRAUENTHAL JC, 1980, MATH THEORY INFECT D
[9]  
Moore D, 2002, IMW 2002: PROCEEDINGS OF THE SECOND INTERNET MEASUREMENT WORKSHOP, P273, DOI 10.1145/637201.637244
[10]   Stochastic behavior of Random Constant Scanning worms [J].
Rohloff, KR ;
Basar, T .
ICCCN 2005: 14th International Conference on Computer Communications and Networks, Proceedings, 2005, :339-344