期刊文献+

Modeling and analysis of anti-worm in P2P networks

Modeling and analysis of anti-worm in P2P networks
原文传递
导出
摘要 Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks have not been studied in depth. This paper introduces both of them to fight against malicious worm in P2P networks. To study their effectiveness in P2P networks, this paper takes the topology degree in P2P networks into consideration and puts forward a four-state propagation model for active anti-worm and a five-state propagation model for passive anti-worm respectively. Both of the models are simplified in the case that size of a P2P network is large enough. The simulation results have not only validated the effectiveness of our propagation models but also evaluated the excellent performance of both active anti-worm and passive anti-worm. Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks have not been studied in depth. This paper introduces both of them to fight against malicious worm in P2P networks. To study their effectiveness in P2P networks, this paper takes the topology degree in P2P networks into consideration and puts forward a four-state propagation model for active anti-worm and a five-state propagation model for passive anti-worm respectively. Both of the models are simplified in the case that size of a P2P network is large enough. The simulation results have not only validated the effectiveness of our propagation models but also evaluated the excellent performance of both active anti-worm and passive anti-worm.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第1期112-118,共7页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (60973139,60773041,61003039,61003236) Scientific & Technological Support Project (Industry) of Jiangsu Province (BE2010197,BE2010198) Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions (10KJB520013,10KJB520014) Scientific Research & Industry Promotion Project for Higher Education Institutions (JH10-14) Science & Technology Innovation Fund for Higher Education Institutions of Jiangsu Province (CX10B-196Z) the Six Kinds of Top Talent of Jiangsu Province (2008118) Doctoral Fund of Ministry of Education of China (20103223120007) Key Laboratory Foundation of Information Technology Processing of Jiangsu Province (KJS1022) the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)
关键词 P2P network anti-worm WORM propagation model P2P network, anti-worm, worm, propagation model
  • 相关文献

参考文献3

二级参考文献32

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2乐光学,李仁发,周祖德.基于Region多层结构P2P计算网络模型[J].软件学报,2005,16(6):1140-1150. 被引量:22
  • 3Zhou L.,Zhang L.,McSherry F.,Immorlica N.,Chien S..A first look at peer-to-peer worms:Threats and defenses.In:Proceedings of the Peer-to-Peer Systems 4th International Workshop,Ithaca,NY,USA,2005,24~35
  • 4Stoica I.,Morris R.,Karger D.,Kaashoek M.F.,Balakrishnan H..Chord:A scalable peer-to-peer lookup service for internet applications.In:Proceedings of the ACM SIGCOMM2001,San Diego,2001,149~160
  • 5Ratnasamy S.,Francis P.,Handley M.,Karp R.,ShenkerS..A scalable content-addressable network.In:Proceedings of the ACM SIGCOMM 2001,San Diego,2001,161~172
  • 6Rowstron A.,Druschel P..Pastry:Scalable,distributed object location and routing for large-scale peer-to-peer systems.In:Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms,Berlin,2001,329~350
  • 7Zhao B.Y.,Kubiatowicz J.D.,Joseph A.D..Tapestry:An infrastructure for fault-tolerant wide-area location and routing.University of California,Berkeleg:Technical Report UCB/CSD-01-1141,2000
  • 8Sit E.,Morris R..Security considerations for peer-to-peer distributed hash tables.In:Proceedings of the 1st International Workshop on Peer-to-Peer Systems,Cambridge,Massachusetts,2002,261~269
  • 9Castro M.,Druschel P.,Ganesh A.,Rowstron A.,Wallach D.S..Secure routing for structured peer-to-peer overlay networks.In:Proceedings of the 5th Usenix Symposium on Operating Systems Design and Implementation,Boston,MA,2002,299~314
  • 10Srivatsa Mudhakar,Liu Ling.Vulnerabilities and security threats in structured overlay networks:A quantitative analysis.In:Proceedings of the 20th IEEE Annual Computer Security Applications Conference,Tucson,Arizona,2004,252~261

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部