proactive worm propagation modeling and analysis in unstructured peer-to-peer networks

proactive worm propagation modeling and analysis in unstructured peer-to-peer networks

ID:34544377

大小:422.35 KB

页数:11页

时间:2019-03-07

proactive worm propagation modeling and analysis in unstructured peer-to-peer networks_第1页
proactive worm propagation modeling and analysis in unstructured peer-to-peer networks_第2页
proactive worm propagation modeling and analysis in unstructured peer-to-peer networks_第3页
proactive worm propagation modeling and analysis in unstructured peer-to-peer networks_第4页
proactive worm propagation modeling and analysis in unstructured peer-to-peer networks_第5页
资源描述:

《proactive worm propagation modeling and analysis in unstructured peer-to-peer networks》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库

1、Zhangetal./JZhejiangUniv-SciC(Comput&Electron)201011(2):119-129119JournalofZhejiangUniversity-SCIENCEC(Computers&Electronics)ISSN1869-1951(Print);ISSN1869-196X(Online)www.zju.edu.cn/jzus;www.springerlink.comE-mail:jzus@zju.edu.cnProactivewormpropagationmodelingandanalysis*inunstructuredp

2、eer-to-peernetworks1†‡112Xiao-songZHANG,TingCHEN,JiongZHENG,HuaLI1(SchoolofComputerScience&Engineering,UniversityofElectronicScienceandTechnologyofChina,Chengdu611731,China)2(Unit78155ofPeople'sLiberationArmy,Chengdu610016,China)†E-mail:chenting19870201@163.comReceivedMar.14,2009;Revisio

3、nacceptedNov.11,2009;CrosscheckedOct.31,2009Abstract:Itisuniversallyacknowledgedbynetworksecurityexpertsthatproactivepeer-to-peer(P2P)wormsmaysoonen-genderseriousthreatstotheInternetinfrastructures.TheselatentthreatsstimulateactivitiesofmodelingandanalysisoftheproactiveP2Pwormpropagation

4、.Basedontheclassicaltwo-factormodel,inthispaper,weproposeanovelproactivewormpropagationmodelinunstructuredP2Pnetworks(calledthefour-factormodel)byconsideringfourfactors:(1)networktopology,(2)countermeasurestakenbyInternetserviceproviders(ISPs)andusers,(3)configurationdiversityofnodesinth

5、eP2Pnetwork,and(4)attackanddefensestrategies.SimulationsandexperimentsshowthatproactiveP2Pwormscanbesloweddownbytwoways:improvementoftheconfigurationdiversityoftheP2Pnetworkandusingpowerfulrulestoreinforcethemostconnectednodesfrombeingcompromised.Thefour-factormodelprovidesabetterdescrip

6、tionandpredictionoftheproactiveP2Pwormpropagation.Keywords:Proactivepeer-to-peer(P2P)wormpropagationmodeling,Networktopology,Configurationdiversity,Attackanddefensestrategies,Four-factormodeldoi:10.1631/jzus.C0910488Documentcode:ACLCnumber:TP309.5;TP393.081Introductionarduoustodetectandc

7、onstrainbecausetheydonotmakeappreciableagitationtonormaltraffic(Yuetal.,Apeer-to-peer(P2P)wormisamaliciouscode2006;Xiaetal.,2007).thatmakesuseofaP2PnetworktospreadfromoneInprinciple,wecastallP2Pwormsintothreemachinetoanother(Khiatetal.,2006).P2Psystemscategories:passiveP2

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。