It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense | Yang | Journal of Networks
Journal of Networks, Vol 6, No 1 (2011), 153-162, Jan 2011
doi:10.4304/jnw.6.1.153-162

Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense

Wei Yang, Gui-RAN Chang, Yu Yao, Xiao-meng Shen

Abstract


The propagation of P2P worm covers large area and causes great damage. A dynamic quarantine protocol is designed to quarantine the suspicious host in the P2P system. Then a mathematical model of PWPQ is proposed which considering the dynamic process of peer joining and leaving. The effect of dynamic quarantine on active P2P worm is analyzed. Through stability analysis for PWPQ model, a key argument of infection-free stable point which affect the P2P worm propagation, the basic reproduction number, is deduced. Simulation results show that the propagation model of P2P worms can reflect the P2P worm behaviors and the performance of our model is significantly better than other models, in terms of decreasing the number of infected hosts and reducing the worm propagation speed. When the basic reproduction number is less than 1, infection-free stable point is global stability and the P2P worm are eliminated. The PWPQ model gives some way to control P2P worm break out and gives guidelines to P2P worm detection and defense.


Keywords


P2P worm; worm propagation; dynamic quarantine;epidemic model;the basic reproduction number

References


[1] http://en.wikipedia.org/wiki/Peer-to-peer

[2] Wei Yu, Sriram Chellappan, Xun Wang. “Peer-to-peer system-based active worm attacks: Modeling, analysis and defense,” Computer Communications, vol. 31, Issue 17, pp. 4005-4017, Nov. 2008.
doi:10.1016/j.comcom.2008.08.008

[3] Xiao-song Zhang,Ting Chen,Jiong Zheng, Hua Li. “Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks,”Jounal of Zhejiang University-SCIENCE,vol.11,No.2,pp.119-129,Nov.2010.
doi:10.1631/jzus.C0910488

[4] Zhou Li-dong, Zhang Lin-tao, Mcsheery Frank. “A first look at peer-to-peer worms: threats and defenses,” Proc.4th Int. Workshop of Peer-to-Peer Systems,pp.24-35, 2005.

[5] Daniel Stutzbach, Reza Rejaie. “Understanding Churn in Peer-to-Peer Networks, ” Proceedings of the 6th ACM SIGCOMM conference on Internet measurement,pp. 189-202,2006.

[6] Thommes,R.,Coates,M. “Epidemiological Modeling of Peer-to-Peer Viruses and Pollution, ”Proc.25th IEEE Int. Conf. on Computer Communications,pp.181-192,2006.
doi:10.1109/INFOCOM.2006.101

[7] Chen,G.,Gray,R.S., “Simulating Non-scanning Worms on Peer-to-Peer Networks, ” Proc.1st Int. Conf. on Scalable Information Systems,pp.29-41,2006.
doi:10.1145/1146847.1146876

[8] Li, Z., Zhang, Y., Hu,Z., Lin,H.,Lu,C.,“Netowrk-Based Detection Method Against Proactive P2P Worms Leveraging Application-Level knowledge,” Proc. 1st Int. Workshop on Education Technology and Computer Science, pp.575-580,2009.
doi:10.1109/ETCS.2009.661

[9] S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, A scalable content addressable network, in: Proceedings of ACM SIGCOMM 2001, San Deigo, CA, August 2001.

[10] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: a scalable peer-to-peer lookup service for internet applications, in: Proceedings of ACM SIGCOMM 2001, San Deigo, CA, August 2001.

[11] M. Ripeanu, I. Foster, “Mapping the gnutella network: macroscopic properties of large-scale peer-to-peer systems,” in: Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA, March 2002.

[12] L.A. Adamic, R.M. Lukose, A.R. Puniyani, B.A. Huberman, “Search in power-law networks,” Physical Review E 046135 (64), 2001.

[13] Silvery, P.,Hurwitz,L. “Adapting Peer-to-Peer Topologies to Improve System Performance,” Proc.Hawaii Int. Conf. on System Sciences,pp.3117-3126,2004.
doi:10.1109/HICSS.2004.1265470

[14] Tao Li, Z Guan, “Modeling and analyzing the spread of active worms based on P2P systems,” Computers & Security,Volume 26, Issue 3, May 2007,pp.213-218

[15] Yao Y, Lv J, Gao F, Zhang Y, Yu G., “Behavior-based worm detection and signature generation,” 2008 International Multi-symposiums on Computer and Computational Sciences; 2008. pp.124-131.

[16] Wagner A, Plattner B, “Entropy based worm and anomaly detection in fast IP networks,” 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise; 2005. pp.172-177.

[17] Sun W, Chen Y, “A rough set approach for automatic key attributes identification of zero-day polymorphic worms,” Expert Systems with Applications, vol.36(3), 2008, pp. 4672-4679.
doi:10.1016/j.eswa.2008.06.037

[18] Zou CC, Gong W, Towsley D, “Worm propagation modeling and analysis under dynamic quarantine defense,” Proceedings of the 2003 ACM workshop on Rapid malcode (WORM’03); 2003. pp. 51-60.

[19] Patil, N.; Chhaya Das; Shreya Patankar; Pol, K., “Analysis of Distributed Intrusion Detection SystemsUsing Mobile Agents,” Emerging Trends in Engineering and Technology, 2008, pp.1255-1260.

[20] S Qing, W Wen, “A survey and trends on Internet worms,” Computers & Security, vol.24, Issue 4, pp.334-346, June 2005.
doi:10.1016/j.cose.2004.10.001

[21] Zou, C.C., Towsley, D., Weibo, G., “On the performance of Internet worm scanning strategies,” Perform. Eval., 63(7):700-723.
doi:10.1016/j.peva.2005.07.032

[22] Wang Y, Wang CX., “Modeling the effects of timing parameters on virus propagation,” Staniford S, ed. Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003). Washington, 2003.
doi:10.1145/948187.948198

[23] Ossama Toutonji and Seong-Moo Yoo, “Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense,” KSII Transactions on Internet and Information Systems,2009.

[24] W Yu, S Chellappan, X Wang, D Xuan, “Peer-to-peer system-based active worm attacks: modeling, analysis and defense,”Computer Communications,2008,31(17),pp.4005-4017.
doi:10.1016/j.comcom.2008.08.008

[25] Yejiang Zhang,Zhitang Li, “Evolutionary Proactive P2P Worm: Propagation Modeling and Simulation,” Genetic and Evolutionary Computing, 2008.

[26] O. Diekmann, J. A. P. Heesterbeek., “Mathematica Epidemiology of Infectious Diseases: Model Builid and, Analysis and Interpretation,” Wiley, 1999.

[27] MARHOMY A A, ABDEL N E. Stability analysis of rotor-bearing systems via Routh-Hurwitz criterion[J]. Elsevier Applied Energy.2004 doi:10.1016/SO3062619(03) 00139-9.287-308.

[28] Van den Driessche P, Watmough J, “Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission,” Mathematical Biosciences 2002;180(1):29-48.
doi:10.1016/S0025-5564(02)00108-6


Full Text: PDF


Journal of Networks (JNW, ISSN 1796-2056)

Copyright @ 2006-2014 by ACADEMY PUBLISHER – All rights reserved.