Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense
Abstract
Keywords
References
[1] http://en.wikipedia.org/wiki/Peer-to-peer
[2] Wei Yu, Sriram Chellappan, Xun Wang. “Peer-to-peer system-based active worm attacks: Modeling, analysis and defense,” Computer Communications, vol. 31, Issue 17, pp. 4005-4017, Nov. 2008.
doi:10.1016/j.comcom.2008.08.008
[3] Xiao-song Zhang,Ting Chen,Jiong Zheng, Hua Li. “Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks,”Jounal of Zhejiang University-SCIENCE,vol.11,No.2,pp.119-129,Nov.2010.
doi:10.1631/jzus.C0910488
[4] Zhou Li-dong, Zhang Lin-tao, Mcsheery Frank. “A first look at peer-to-peer worms: threats and defenses,” Proc.4th Int. Workshop of Peer-to-Peer Systems,pp.24-35, 2005.
[5] Daniel Stutzbach, Reza Rejaie. “Understanding Churn in Peer-to-Peer Networks, ” Proceedings of the 6th ACM SIGCOMM conference on Internet measurement,pp. 189-202,2006.
[6] Thommes,R.,Coates,M. “Epidemiological Modeling of Peer-to-Peer Viruses and Pollution, ”Proc.25th IEEE Int. Conf. on Computer Communications,pp.181-192,2006.
doi:10.1109/INFOCOM.2006.101
[7] Chen,G.,Gray,R.S., “Simulating Non-scanning Worms on Peer-to-Peer Networks, ” Proc.1st Int. Conf. on Scalable Information Systems,pp.29-41,2006.
doi:10.1145/1146847.1146876
[8] Li, Z., Zhang, Y., Hu,Z., Lin,H.,Lu,C.,“Netowrk-Based Detection Method Against Proactive P2P Worms Leveraging Application-Level knowledge,” Proc. 1st Int. Workshop on Education Technology and Computer Science, pp.575-580,2009.
doi:10.1109/ETCS.2009.661
[9] S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, A scalable content addressable network, in: Proceedings of ACM SIGCOMM 2001, San Deigo, CA, August 2001.
[10] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for internet applications, in: Proceedings of ACM SIGCOMM 2001, San Deigo, CA, August 2001.
[11] M. Ripeanu, I. Foster, “Mapping the gnutella network: macroscopic properties of large-scale peer-to-peer systems,” in: Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA, March 2002.
[12] L.A. Adamic, R.M. Lukose, A.R. Puniyani, B.A. Huberman, “Search in power-law networks,” Physical Review E 046135 (64), 2001.
[13] Silvery, P.,Hurwitz,L. “Adapting Peer-to-Peer Topologies to Improve System Performance,” Proc.Hawaii Int. Conf. on System Sciences,pp.3117-3126,2004.
doi:10.1109/HICSS.2004.1265470
[14] Tao Li, Z Guan, “Modeling and analyzing the spread of active worms based on P2P systems,” Computers & Security,Volume 26, Issue 3, May 2007,pp.213-218
[15] Yao Y, Lv J, Gao F, Zhang Y, Yu G., “Behavior-based worm detection and signature generation,” 2008 International Multi-symposiums on Computer and Computational Sciences; 2008. pp.124-131.
[16] Wagner A, Plattner B, “Entropy based worm and anomaly detection in fast IP networks,” 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise; 2005. pp.172-177.
[17] Sun W, Chen Y, “A rough set approach for automatic key attributes identification of zero-day polymorphic worms,” Expert Systems with Applications, vol.36(3), 2008, pp. 4672-4679.
doi:10.1016/j.eswa.2008.06.037
[18] Zou CC, Gong W, Towsley D, “Worm propagation modeling and analysis under dynamic quarantine defense,” Proceedings of the 2003 ACM workshop on Rapid malcode (WORM’03); 2003. pp. 51-60.
[19] Patil, N.; Chhaya Das; Shreya Patankar; Pol, K., “Analysis of Distributed Intrusion Detection SystemsUsing Mobile Agents,” Emerging Trends in Engineering and Technology, 2008, pp.1255-1260.
[20] S Qing, W Wen, “A survey and trends on Internet worms,” Computers & Security, vol.24, Issue 4, pp.334-346, June 2005.
doi:10.1016/j.cose.2004.10.001
[21] Zou, C.C., Towsley, D., Weibo, G., “On the performance of Internet worm scanning strategies,” Perform. Eval., 63(7):700-723.
doi:10.1016/j.peva.2005.07.032
[22] Wang Y, Wang CX., “Modeling the effects of timing parameters on virus propagation,” Staniford S, ed. Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003). Washington, 2003.
doi:10.1145/948187.948198
[23] Ossama Toutonji and Seong-Moo Yoo, “Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense,” KSII Transactions on Internet and Information Systems,2009.
[24] W Yu, S Chellappan, X Wang, D Xuan, “Peer-to-peer system-based active worm attacks: modeling, analysis and defense,”Computer Communications,2008,31(17),pp.4005-4017.
doi:10.1016/j.comcom.2008.08.008
[25] Yejiang Zhang,Zhitang Li, “Evolutionary Proactive P2P Worm: Propagation Modeling and Simulation,” Genetic and Evolutionary Computing, 2008.
[26] O. Diekmann, J. A. P. Heesterbeek., “Mathematica Epidemiology of Infectious Diseases: Model Builid and, Analysis and Interpretation,” Wiley, 1999.
[27] MARHOMY A A, ABDEL N E. Stability analysis of rotor-bearing systems via Routh-Hurwitz criterion[J]. Elsevier Applied Energy.2004 doi:10.1016/SO3062619(03) 00139-9.287-308.
[28] Van den Driessche P, Watmough J, “Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission,” Mathematical Biosciences 2002;180(1):29-48.
doi:10.1016/S0025-5564(02)00108-6
Full Text: PDF