计算机科学 ›› 2013, Vol. 40 ›› Issue (5): 141-146.

• 信息安全 • 上一篇    下一篇

基于形式化逻辑矩阵的结构化P2P蠕虫对抗模型

唐浩坤,刘宴兵,黄俊,张衡   

  1. 电子科技大学计算机科学与工程学院 成都610054;重庆邮电大学通信与信息工程学院 重庆400065;重庆邮电大学通信与信息工程学院 重庆400065;西南大学计算机与信息科学学院 重庆400715
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受“新一代宽带无线移动通信网”国家科技重大专项课题(2011ZX03002-004-03),重庆市高等教育成果转化项目(Kjzh10206),公安部信息网络安全重点实验室项目(C11609)资助

Structured P2P Worm-anti-worm Model Based on Formalized Logic Matrix

TANG Hao-kun,LIU Yan-bing,HUANG Jun and ZHANG Heng   

  • Online:2018-11-16 Published:2018-11-16

摘要: 良性蠕虫对抗恶性蠕虫是结构化P2P环境下应对蠕虫攻击的有效手段之一,但是已有模型对对抗环境下蠕虫传播过程的描述过于复杂。针对这个问题,提出一种简单的结构化P2P蠕虫对抗模型。该模型利用逻辑矩阵对结构化P2P网络中恶性蠕虫与良性蠕虫的对抗传播过程进行形式化描述,借助模型可以快速地推导出对抗环境下影响恶性P2P蠕虫传播效率的关键因素。此外考虑到P2P节点搅动特征对蠕虫传播的重大影响,将节点变化率引入到模型中,以提高模型的准确性。实验表明,借助形式化逻辑矩阵能有效地降低对抗环境下蠕虫传播模型的复杂度,快速地发现制约蠕虫传播的关键因素,为后续的蠕虫防御提供指导。

关键词: 结构化P2P网络,逻辑矩阵,蠕虫对抗,节点搅动

Abstract: P2P anti-worms is one of the effective countermeasure to malignant worms in structured P2P networks,but the existing models are too complex in describing the propagation processes of worms under attack-defense environment.To address this problem,a simple structured P2P worm-anti-worm model was presented.This model performs the form description to the antagonistic propagation of P2P anti-worms and malignant worms in structured P2P networks by the support of logic matrix,and a number of key parameters that affect the propagation speed of malignant worm under attack-defense environment can be deduced rapidly by the model,besides,considering the significant influence of P2P churn feature on worm propagation,the change rate of nodes is added to the model to improve its accuracy.The experimental results show that formalized logic matrix can reduce the complexity of worm propagation model under attack-defense environment,rapidly identify the key factors that restrict the spread of worms,and supply the reference for the following research work on defending worms.

Key words: Structured P2P network,Logic matrix,Worm-anti-worm,P2P churn

[1] Lui S M,Kwok S H.Interoperability of Peer-To-Peer File Sharing Protocols[J].ACM SIGCOM Exchanges,2002,3(3):25-33
[2] Zhou L D,Zhang L T,Frank M,et al.A first look at peer-to-peer worms threats and defenses[C]∥Proceedings of IPTPS05.Peer-to-Peer Systems IV Lecture Notes in Computer Science,2005,3640:24-35
[3] Yu W.Analyze the worm-based attack in large scale P2P networks[C]∥Proceedings of The 8th IEEE International Symposium on High Assurance Systems Engineering.Tampa,Florida:IEEE Press,2004:308-309
[4] Arce I,Levy E.An analysis of the Slapper worm.IEEE Security & Privacy,2003:82-87
[5] Chen G,Gray R S.Simulating non-scanning worms on peer-to-peer networks[C]∥Proceedings of the 1st International Conferen-ce on Scalable Information Systems.Hong Kong,China,2006
[6] Xie C,Yin Z Y.The Research of Worms in P2P Networks[C]∥Proceedings of Computational Intelligence and Natural Computing International Conference.2009:389-392
[7] 夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959
[8] 罗兴睿,姚羽,高福祥.基于纯P2P原理的蠕虫传播模型的研究[J].通信学报,2006,27(11):53-58
[9] Fan X,Xiang Y.Modeling the Propagation of Peer-to-PeerWorms under Quarantine[C]∥Proceedings of Network Operations and Management Symposium (NOMS).Osaka,Japan:IEEE Press,2010:942-945
[10] Fan X,Xiang Y.Modeling the Propagation Process of Topology-Aware Worms:An Innovative Logic Matrix Formulation[C]∥Proceedings of Network and Parallel Computing 2009Sixth IFIP International Conference.Gold Coast,QLD:IEEE Press,2009:182-189
[11] Fan X,Xiang Y.Propagation Modeling of Peer-to-Peer Worms[C]∥Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications.2010:1128-1135
[12] Fan X,Guo W W,Looi M.Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms[C]∥ Proceedings of Computational Intelligence and Security 2011Seventh International Conference.Hainan,China:IEEE Press,2011:573-577
[13] Shin J,Kim T,TAK S.A Reputation Management Scheme Improving the Trustworthiness of P2P Networks[C]∥Proceedings of Convergence and Hybrid Information Technology 2008International Conference.Daejeon,Korea:IEEE Press,2008:92-97
[14] 冯朝胜,秦志光,Cuthbert L,等.P2P网络中沉默型蠕虫传播建模与分析[J].计算机研究与发展,2010,47(3):500-507
[15] Yang W,Li Y.P2P worm Propagation modeling and analysis under dynamic quarantine defense[C]∥Proceedings of e-Business and Information System Security 20102nd International Conferen-ce.Wuhan,Huhei:IEEE Press,2010:1-4
[16] Yu W,Boyer C,Chellappan S,et al.Peer-to-Peer System-based Active Worm Attacks:Modeling and Analysis[C]∥Proceedings of IEEE International Conference on Communications.2005:295-300
[17] Jafarabadi A,Azgomi M A.An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts[C]∥Proceedings of Information Assurance and Security 7th International Conference.2011:204-209
[18] Gao C X,Zhang F Y,Xin Y,et al.Research on Worm’s Propagation and Defense Model in Different P2P Networks[J].Journal of Beijing University of Posts and Telecommunications,2006,29(22):49-53
[19] 邓眣轶.对等网络蠕虫及其防御技术研究[D].成都:电子科技大学,2007

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!