Modeling Propagation of Active P2P Worm in Chord Network

被引:0
|
作者
Wang, Xuesong [1 ]
Zhu, Jinglin [2 ,3 ]
Lin, Huaizhong [1 ]
Su, Xiaoming [1 ]
Jiang, Yuqian [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou, Zhejiang, Peoples R China
[2] Zhejiang Testing Inst Elect Prod, Zhejiang, Peoples R China
[3] Zhejiang Key Lab Informat Secur, Zhejiang, Peoples R China
来源
关键词
Active P2P Worm; Propagation Model; Chord;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
P2P worms utilize the topology of P2P network, gaining a better propagation effect compared with random scanning worm. The active P2P worm is the most destructive P2P worm, which would generate infection target list from P2P nodes' neighbor information to achieve faster propagation speed and more concealment. Worm propagation in Chord network is special due to the fact that Chord network is structured P2P network. We proposed a propagation model for active P2P worm in Chord network, which fits the structure of Chord. We carry out simulation studies, which indicate that our model is able to describe the propagation of active P2P worm in Chord network well. Further simulation shows that worm takes extremely short time to infect the whole Chord network, suggesting that Chord network is a nice environment for worm propagation.
引用
收藏
页码:389 / +
页数:2
相关论文
共 50 条
  • [2] Active Worm Propagation Modeling in Unstructured P2P Networks
    Zhang, Xiaosong
    Chen, Ting
    Zheng, Jiong
    Li, Hua
    [J]. PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 35 - 38
  • [3] Modeling Propagation of REACTIVE WORM in P2P Networks
    Qin, Zhi-guang
    Feng, Chao-sheng
    Zhang, Feng-li
    CuthbeRt, Laurence
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 335 - +
  • [4] Propagation Model of Non-scanning Active Worm in Unstructured P2P Network
    Li Hua
    Qin Zheng
    Pan Xiaohui
    Zhang Xiaosong
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 378 - +
  • [5] Modeling and analysis of passive worm propagation in the P2P file-sharing network
    Feng, Chao-sheng
    Yang, Jun
    Qin, Zhi-guang
    Yuan, Ding
    Cheng, Hong-rong
    [J]. SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 : 87 - 99
  • [6] Evolutionary Proactive P2P Worm: Propagation Modeling and Simulation
    Zhang, Yejiang
    Li, Zhitang
    Hu, Zhengbing
    Huang, Qingfeng
    Lu, Chuiwei
    [J]. SECOND INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING: WGEC 2008, PROCEEDINGS, 2008, : 261 - 264
  • [7] P2P worm Propagation modeling and analysis under dynamic quarantine defense
    Yang, Wei
    Li, Yong
    Chang, Gui-ran
    Yao, Yu
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 60 - 63
  • [8] Propagation of Active Worms in P2P Networks: Modeling and Analysis
    Tang, Haokun
    Lu, Yukui
    Zhu, Shitong
    Huang, Jun
    [J]. JOURNAL OF COMPUTERS, 2014, 9 (11) : 2514 - 2524
  • [9] Research of Hierarchical P2P Network based on Chord
    Ma, Haibo
    Wang, Deguang
    Zhang, Jiamin
    Shi, Li
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 867 - 871
  • [10] Propagation characteristics analysis of worm-anti-worm in P2P network based on stochastic process algebra
    Yan, Bo
    Wu, Xiao-Ping
    Liao, Wei
    Li, Feng-Hua
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2012, 40 (02): : 293 - 299