Computer Science ›› 2013, Vol. 40 ›› Issue (5): 141-146.

Previous Articles     Next Articles

Structured P2P Worm-anti-worm Model Based on Formalized Logic Matrix

TANG Hao-kun,LIU Yan-bing,HUANG Jun and ZHANG Heng   

  • Online:2018-11-16 Published:2018-11-16

Abstract: P2P anti-worms is one of the effective countermeasure to malignant worms in structured P2P networks,but the existing models are too complex in describing the propagation processes of worms under attack-defense environment.To address this problem,a simple structured P2P worm-anti-worm model was presented.This model performs the form description to the antagonistic propagation of P2P anti-worms and malignant worms in structured P2P networks by the support of logic matrix,and a number of key parameters that affect the propagation speed of malignant worm under attack-defense environment can be deduced rapidly by the model,besides,considering the significant influence of P2P churn feature on worm propagation,the change rate of nodes is added to the model to improve its accuracy.The experimental results show that formalized logic matrix can reduce the complexity of worm propagation model under attack-defense environment,rapidly identify the key factors that restrict the spread of worms,and supply the reference for the following research work on defending worms.

Key words: Structured P2P network,Logic matrix,Worm-anti-worm,P2P churn

[1] Lui S M,Kwok S H.Interoperability of Peer-To-Peer File Sharing Protocols[J].ACM SIGCOM Exchanges,2002,3(3):25-33
[2] Zhou L D,Zhang L T,Frank M,et al.A first look at peer-to-peer worms threats and defenses[C]∥Proceedings of IPTPS05.Peer-to-Peer Systems IV Lecture Notes in Computer Science,2005,3640:24-35
[3] Yu W.Analyze the worm-based attack in large scale P2P networks[C]∥Proceedings of The 8th IEEE International Symposium on High Assurance Systems Engineering.Tampa,Florida:IEEE Press,2004:308-309
[4] Arce I,Levy E.An analysis of the Slapper worm.IEEE Security & Privacy,2003:82-87
[5] Chen G,Gray R S.Simulating non-scanning worms on peer-to-peer networks[C]∥Proceedings of the 1st International Conferen-ce on Scalable Information Systems.Hong Kong,China,2006
[6] Xie C,Yin Z Y.The Research of Worms in P2P Networks[C]∥Proceedings of Computational Intelligence and Natural Computing International Conference.2009:389-392
[7] 夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959
[8] 罗兴睿,姚羽,高福祥.基于纯P2P原理的蠕虫传播模型的研究[J].通信学报,2006,27(11):53-58
[9] Fan X,Xiang Y.Modeling the Propagation of Peer-to-PeerWorms under Quarantine[C]∥Proceedings of Network Operations and Management Symposium (NOMS).Osaka,Japan:IEEE Press,2010:942-945
[10] Fan X,Xiang Y.Modeling the Propagation Process of Topology-Aware Worms:An Innovative Logic Matrix Formulation[C]∥Proceedings of Network and Parallel Computing 2009Sixth IFIP International Conference.Gold Coast,QLD:IEEE Press,2009:182-189
[11] Fan X,Xiang Y.Propagation Modeling of Peer-to-Peer Worms[C]∥Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications.2010:1128-1135
[12] Fan X,Guo W W,Looi M.Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms[C]∥ Proceedings of Computational Intelligence and Security 2011Seventh International Conference.Hainan,China:IEEE Press,2011:573-577
[13] Shin J,Kim T,TAK S.A Reputation Management Scheme Improving the Trustworthiness of P2P Networks[C]∥Proceedings of Convergence and Hybrid Information Technology 2008International Conference.Daejeon,Korea:IEEE Press,2008:92-97
[14] 冯朝胜,秦志光,Cuthbert L,等.P2P网络中沉默型蠕虫传播建模与分析[J].计算机研究与发展,2010,47(3):500-507
[15] Yang W,Li Y.P2P worm Propagation modeling and analysis under dynamic quarantine defense[C]∥Proceedings of e-Business and Information System Security 20102nd International Conferen-ce.Wuhan,Huhei:IEEE Press,2010:1-4
[16] Yu W,Boyer C,Chellappan S,et al.Peer-to-Peer System-based Active Worm Attacks:Modeling and Analysis[C]∥Proceedings of IEEE International Conference on Communications.2005:295-300
[17] Jafarabadi A,Azgomi M A.An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts[C]∥Proceedings of Information Assurance and Security 7th International Conference.2011:204-209
[18] Gao C X,Zhang F Y,Xin Y,et al.Research on Worm’s Propagation and Defense Model in Different P2P Networks[J].Journal of Beijing University of Posts and Telecommunications,2006,29(22):49-53
[19] 邓眣轶.对等网络蠕虫及其防御技术研究[D].成都:电子科技大学,2007

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!