Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (2): 119-129    DOI: 10.1631/jzus.C0910488
    
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks
Xiao-song ZHANG1, Ting CHEN*,1, Jiong ZHENG1, Hua LI2
1 School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China 2 Unit 78155 of People\'s Liberation Army, Chengdu 610016, China
Download:   PDF(423KB)
Export: BibTeX | EndNote (RIS)      

Abstract  It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon engender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model, in this paper, we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors: (1) network topology, (2) countermeasures taken by Internet service providers (ISPs) and users, (3) configuration diversity of nodes in the P2P network, and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways: improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation.

Key wordsProactive peer-to-peer (P2P) worm propagation modeling      Network topology      Configuration diversity      Attack and defense strategies      Four-factor model     
Received: 14 March 2009      Published: 01 January 2010
CLC:  TP309.5  
  TP393.08  
Fund:  Project  (No.  09511501600)  partially  supported  by  the  Science  and Technology Commission of Shanghai Municipality, China
Cite this article:

Xiao-song ZHANG, Ting CHEN, Jiong ZHENG, Hua LI. Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks. Front. Inform. Technol. Electron. Eng., 2010, 11(2): 119-129.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/jzus.C0910488     OR     http://www.zjujournals.com/xueshu/fitee/Y2010/V11/I2/119


Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks

It is universally acknowledged by network security experts that proactive peer-to-peer (P2P) worms may soon engender serious threats to the Internet infrastructures. These latent threats stimulate activities of modeling and analysis of the proactive P2P worm propagation. Based on the classical two-factor model, in this paper, we propose a novel proactive worm propagation model in unstructured P2P networks (called the four-factor model) by considering four factors: (1) network topology, (2) countermeasures taken by Internet service providers (ISPs) and users, (3) configuration diversity of nodes in the P2P network, and (4) attack and defense strategies. Simulations and experiments show that proactive P2P worms can be slowed down by two ways: improvement of the configuration diversity of the P2P network and using powerful rules to reinforce the most connected nodes from being compromised. The four-factor model provides a better description and prediction of the proactive P2P worm propagation.

关键词: Proactive peer-to-peer (P2P) worm propagation modeling,  Network topology,  Configuration diversity,  Attack and defense strategies,  Four-factor model 
[1] Han Qi, Muhammad Shiraz, Jie-yao Liu, Abdullah Gani, Zulkanain ABDUL Rahman, Torki A. Altameem. Data center network architecture in cloud computing: review, taxonomy, and open research issues[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(9): 776-793.