期刊文献+

Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8

Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks
下载PDF
导出
摘要 Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.
出处 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页 天津大学学报(英文版)
基金 National Natural Science Foundation of China (No.60633020 and No. 90204012) Natural Science Foundation of Hebei Province (No. F2006000177)
关键词 网络安全 蠕虫病毒 计算技术 防治措施 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
  • 相关文献

参考文献10

  • 1Nassima K,Yannick C,Nazim A.The emerging threat of peer-to-peer worms[].IEEE / IST Workshop on Monitoring Attack Detection and Mitigation.2006
  • 2Yu W,Corey B,Sriram C et al.Peer-to-peer system- based active worm attacks: Modeling and analysis[].Proceedings of IEEE International Conference on Communications.2005
  • 3Zesheng C,Lixin G,Kwiat K.Modeling the spread of active worms[].Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communica-tions Societies.2003
  • 4Zhou L,Zhang L,Mcsherry F et al.A first look at peer- to-peer worms: Threats and defenses[].Proceedings of the th International Workshop on Peer-to-Peer Systems.2005
  • 5Guanling C,Robert S G.Simulating non-scanning worms on peer-to-peer networks[].Proceedings of the st International Conference on Scalable Information Systems.2006
  • 6Thommes R,Coates M.Epidemiological modeling of peer-to-peer viruses and pollution[].The th Annual IEEE Conference on Computer Communications.2006
  • 7Krishna R,Biplab S.Modeling malware propagation in Gnutella type peer-to-peer networks[].Proceedings of the Third International Workshop on Hot Topics in Peer- to-Peer Systems (Hot-PP).2006
  • 8Richard W T,Mark J C.Modeling virus propagation in peer-to-peer networks[].IEEE International Con- ference on Information Communications & Signal Process- ing.2005
  • 9Shakkottai S,Srikant R.Peer to peer networks for defense against Internet worms[].Proceedings fromthe Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer & Communications Systems (INTERPERF‘).2006
  • 10Andrew K,Abhinav A,Minaxi G.A study of malware in peer-to-peer networks[].Proceedings of the th ACM SIGCOMM on Internet Measurement.2006

同被引文献80

  • 1高长喜,章甫源,辛阳,钮心忻,杨义先.P2P网络中蠕虫传播与防治模型的研究[J].北京邮电大学学报,2006,29(z2):49-53. 被引量:6
  • 2夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959. 被引量:26
  • 3郝向东,王开云,张春瑞,李佳.蠕虫在P2P网络中的传播研究[J].计算机工程,2007,33(8):139-141. 被引量:5
  • 4Chen G, Gray R S. Simulating non-scanning worms on peer- to-peer networks[C/OL] /]Proc of the 1st Int Conf on Scalable Information Systems. New York: ACM, 2006 [2008-04-12]. http://www.cs. uml. edu/-glchen//papers/ chen_p2pworm. pdf.
  • 5Zhou L, Zhang L, McSherry F, et al. A first look at peer-to- peer worms: Threats and defenses [C] //Proc of the 4th Int Workshop on Peer-to-Peer Systems. Berlin: Springer, 2005: 24-35.
  • 6McKendrick A G. Applications of mathematics to medical problems [C] //Proc of the 44th Edinburgh Mathematica Society. Edinburgh: Cambridge University, 1926:98-130.
  • 7Kephart J O, White S R. Directed-graph epidemlological models of computer viruses [C]//Proc of the IEEE Syrup on Security andPrivacy. Piscataway, NJ: IEEE, 1991: 343- 359.
  • 8Zou C C, Gong W, Towsley D. Code red worm propagation modeling and analysis [C/OL] //Proc of the ACM Conf on Computer and Communication Security (CCS'02). New York: ACM, 2002 [2008-01-20]. http://www. itsec.gov. cn/webportal/download/2002-Code% 20Red% 20Worm% 20Propagation%20Modeling%20and%20Analysis. pdf.
  • 9Zou C C, Towsley D, Gong W. Email worm modeling and defence [C]//Proc of the 13th Int Conf on Computer Communication and Networks. Piscataway, NJ: IEEE, 2004 : 409-414.
  • 10Qiu D, Srikant R. Modeling and performance analysis of BitTorrent-like peer-to-peer networks [C]//Proc of the ACM SIGCOMM. New York: ACM, 2004:367-378.

引证文献8

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部