Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks

Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, off line and online rate is constructed based on the actual situation of P2P users. The basic reproduction number that governs whether a passive worm is extinct or not is obtained. In this model, time delay consists of latent and temporary immunity periods. The impact of different parameters on this model is studied with simulation results, especially the effect of time delay, which can provide an important guideline in the control of unstructured P2P networks as well as passive worm defense.

[1]  Kevin A. Kwiat,et al.  Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[2]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[3]  Steve Chien,et al.  A First Look at Peer-to-Peer Worms: Threats and Defenses , 2005, IPTPS.

[4]  Kendrick,et al.  Applications of Mathematics to Medical Problems , 1925, Proceedings of the Edinburgh Mathematical Society.

[5]  G. Röst,et al.  ON A SEIR EPIDEMIC MODEL WITH DELAY , 2012 .

[6]  K. L. Cooke,et al.  Analysis of an SEIRS epidemic model with two delays , 1996, Journal of mathematical biology.

[7]  M. Newman,et al.  Random graphs with arbitrary degree distributions and their applications. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.

[8]  Li Lin,et al.  Balancing Trust and Incentive in Peer-to-Peer Collaborative System , 2007, Int. J. Netw. Secur..

[9]  Beom Jun Kim,et al.  Growing scale-free networks with tunable clustering. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[10]  Minaxi Gupta,et al.  A study of malware in peer-to-peer networks , 2006, IMC '06.

[11]  YuWei,et al.  Peer-to-peer system-based active worm attacks , 2008 .

[12]  Yingyou Wen,et al.  Passive Worm Propagation Modeling and Analysis , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).

[13]  B. Levine,et al.  Availability and Popularity Measurements of Peer-to-Peer File Systems , 2004 .

[14]  Qingyu Zhang,et al.  A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast , 2008, Int. J. Netw. Secur..

[15]  Xia Chun Research on Epidemic Models of P2P Worm in Structured Peer-to-Peer Networks , 2006 .

[16]  Mark Coates,et al.  Epidemiological Modelling of Peer-to-Peer Viruses and Pollution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[17]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[18]  Dinesh Kumar Saini,et al.  SEIRS epidemic model with delay for transmission of malicious objects in computer network , 2007, Appl. Math. Comput..

[19]  Guanling Chen,et al.  Simulating non-scanning worms on peer-to-peer networks , 2006, InfoScale '06.