Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (2): 119-129    DOI: 10.1631/jzus.C0910488
    
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Xiao-song ZHANG1, Ting CHEN*,1, Jiong ZHENG1, Hua LI2
1 School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China 2 Unit 78155 of People\'s Liberation Army, Chengdu 610016, China
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Xiao-song ZHANG1, Ting CHEN*,1, Jiong ZHENG1, Hua LI2
1 School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China 2 Unit 78155 of People\'s Liberation Army, Chengdu 610016, China
 全文: PDF(423 KB)  
摘要: It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon engender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model, in this paper, we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors: (1) network topology, (2) countermeasures taken by Internet service providers (ISPs) and users, (3) configuration diversity of nodes in the P2P network, and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways: improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation.
关键词: Proactive peer-to-peer (P2P) worm propagation modelingNetwork topologyConfiguration diversityAttack and defense strategiesFour-factor model    
Abstract: It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon engender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model, in this paper, we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors: (1) network topology, (2) countermeasures taken by Internet service providers (ISPs) and users, (3) configuration diversity of nodes in the P2P network, and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways: improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation.
Key words: Proactive peer-to-peer (P2P) worm propagation modeling    Network topology    Configuration diversity    Attack and defense strategies    Four-factor model
收稿日期: 2009-03-14 出版日期: 2010-01-01
CLC:  TP309.5  
基金资助: Project  (No.  09511501600)  partially  supported  by  the  Science  and Technology Commission of Shanghai Municipality, China
通讯作者: Ting CHEN     E-mail: chenting19870201@163.com
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Xiao-song ZHANG
Ting CHEN
Jiong ZHENG
Hua LI

引用本文:

Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI. Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks. Front. Inform. Technol. Electron. Eng., 2010, 11(2): 119-129.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C0910488        http://www.zjujournals.com/xueshu/fitee/CN/Y2010/V11/I2/119

No related articles found!