期刊文献+

A Potential Approach of Internet Worm Propagation Based on P2P

A Potential Approach of Internet Worm Propagation Based on P2P
下载PDF
导出
摘要 Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation approach, is given in this paper. To measure the propagating performance of our approach, the SEI (Susceptible-Exposed-Infected) propagation model is presented. It proves that with the idea of pure P2P architecture, worms can be hidden in the early stage of propagation, and then infect most of the hosts in a shorter period. By comparing our SEI propagation model with the Simple Epidemic Model, we observe that the size of a worm is a significant parameter which can affect the propagating performance. When the size of the worm becomes large, our approach can still show an excellent propagating performance. Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation approach, is given in this paper. To measure the propagating performance of our approach, the SEI (Susceptible-Exposed-Infected) propagation model is presented. It proves that with the idea of pure P2P architecture, worms can be hidden in the early stage of propagation, and then infect most of the hosts in a shorter period. By comparing our SEI propagation model with the Simple Epidemic Model, we observe that the size of a worm is a significant parameter which can affect the propagating performance. When the size of the worm becomes large, our approach can still show an excellent propagating performance.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1711-1714,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60473073)
关键词 WORM P2P (Peer-to-Peer)-based propagation approach SEI (susceptible-exposed-infected) model size of worm worm P2P (Peer-to-Peer)-based propagation approach SEI (susceptible-exposed-infected) model size of worm
  • 相关文献

参考文献11

  • 1Ira B. Schwartz,H. L. Smith.Infinite subharmonic bifurcation in an SEIR epidemic model[J].Journal of Mathematical Biology.1983(3)
  • 2Jeffrey O Kephart,Steve R.White.Directed-Graph Epidemiological Models of Computer Viruses[].Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy.1991
  • 3CHEN Ze-sheng,GAO L,KWIAT K.Modeling thespread of active worms[].Proc InINFOCOM.2003
  • 4Sun,H. P2P Protocols Analysis and Blocking Algorithm [C] //Proc of ICCSA 2005 . 2005
  • 5M.Y. Li,J.S. Muldowney.Global stability for the SEIR model in epidemiology[].Mathematical Biosciences.1995
  • 6Qing S H,Wen W P.A survey and trends on Internet worms[].Computers and Security.2005
  • 7Ioannis Sourdis,,Dionisios Pnevmatikatos.Pre-decoded CAMs for Efficient and High-Speed NIDS Pattern Matching[].IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM‘).2004
  • 8Shankar, U,Paxson, V.Active Mapping: Resisting NIDS Evasion without Altering Traffic[].Proc of IEEE Sympon Security and Privacy.2003
  • 9Schwartz,I,Smith,H.Infinite Subharmonic Bifurcation in an SEIR Epidemic Model[].Journal of Mathematical Biology.1983
  • 10Kamra A,Feng H,Misra V,et al.The Effect of DNS De- lays on WormPropagation in an IPv6 Internet[].Proc of IEEE Infocom.2005

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部