资源描述:
《proactive worm propagation modeling and analysis in unstructured peer-to-peer networks》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、Zhangetal./JZhejiangUniv-SciC(Comput&Electron)201011(2):119-129119JournalofZhejiangUniversity-SCIENCEC(Computers&Electronics)ISSN1869-1951(Print);ISSN1869-196X(Online)www.zju.edu.cn/jzus;www.springerlink.comE-mail:jzus@zju.edu.cnProactivewormpropagationmodelingandanalysis*inunstructuredp
2、eer-to-peernetworks1†‡112Xiao-songZHANG,TingCHEN,JiongZHENG,HuaLI1(SchoolofComputerScience&Engineering,UniversityofElectronicScienceandTechnologyofChina,Chengdu611731,China)2(Unit78155ofPeople'sLiberationArmy,Chengdu610016,China)†E-mail:chenting19870201@163.comReceivedMar.14,2009;Revisio
3、nacceptedNov.11,2009;CrosscheckedOct.31,2009Abstract:Itisuniversallyacknowledgedbynetworksecurityexpertsthatproactivepeer-to-peer(P2P)wormsmaysoonen-genderseriousthreatstotheInternetinfrastructures.TheselatentthreatsstimulateactivitiesofmodelingandanalysisoftheproactiveP2Pwormpropagation
4、.Basedontheclassicaltwo-factormodel,inthispaper,weproposeanovelproactivewormpropagationmodelinunstructuredP2Pnetworks(calledthefour-factormodel)byconsideringfourfactors:(1)networktopology,(2)countermeasurestakenbyInternetserviceproviders(ISPs)andusers,(3)configurationdiversityofnodesinth
5、eP2Pnetwork,and(4)attackanddefensestrategies.SimulationsandexperimentsshowthatproactiveP2Pwormscanbesloweddownbytwoways:improvementoftheconfigurationdiversityoftheP2Pnetworkandusingpowerfulrulestoreinforcethemostconnectednodesfrombeingcompromised.Thefour-factormodelprovidesabetterdescrip
6、tionandpredictionoftheproactiveP2Pwormpropagation.Keywords:Proactivepeer-to-peer(P2P)wormpropagationmodeling,Networktopology,Configurationdiversity,Attackanddefensestrategies,Four-factormodeldoi:10.1631/jzus.C0910488Documentcode:ACLCnumber:TP309.5;TP393.081Introductionarduoustodetectandc
7、onstrainbecausetheydonotmakeappreciableagitationtonormaltraffic(Yuetal.,Apeer-to-peer(P2P)wormisamaliciouscode2006;Xiaetal.,2007).thatmakesuseofaP2PnetworktospreadfromoneInprinciple,wecastallP2Pwormsintothreemachinetoanother(Khiatetal.,2006).P2Psystemscategories:passiveP2