|
Journal of Zhejiang University SCIENCE C
ISSN 1869-1951(Print), 1869-196x(Online), Monthly
2010 Vol.11 No.2 P.119-129
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Abstract: It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon engender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model, in this paper, we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors: (1) network topology, (2) countermeasures taken by Internet service providers (ISPs) and users, (3) configuration diversity of nodes in the P2P network, and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways: improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation.
Key words: Proactive peer-to-peer (P2P) worm propagation modeling, Network topology, Configuration diversity, Attack and defense strategies, Four-factor model
References:
Open peer comments: Debate/Discuss/Question/Opinion
<1>
Xiao Shengfang
2010-03-28 19:48:35
An interesting model with exhaustive analysis. I strongly recommend this paper.
2010-03-17 21:48:11
Nice paper. May I have further discussion on this topic with you, sir?
fang
2010-01-09 18:26:17
It's too difficult for me to understand it , good good good
fang
2010-01-09 18:21:15
just so so
DOI:
10.1631/jzus.C0910488
CLC number:
TP309.5; TP393.08
Download Full Text:
Downloaded:
4610
Clicked:
12204
Cited:
8
On-line Access:
2024-08-27
Received:
2023-10-17
Revision Accepted:
2024-05-08
Crosschecked:
2009-10-31