Abstract
P2P worms utilize the topology of P2P network, gaining a better propagation effect compared with random scanning worm. The active P2P worm is the most destructive P2P worm, which would generate infection target list from P2P nodes’ neighbor information to achieve faster propagation speed and more concealment. Worm propagation in Chord network is special due to the fact that Chord network is structured P2P network. We proposed a propagation model for active P2P worm in Chord network, which fits the structure of Chord. We carry out simulation studies, which indicate that our model is able to describe the propagation of active P2P worm in Chord network well. Further simulation shows that worm takes extremely short time to infect the whole Chord network, suggesting that Chord network is a nice environment for worm propagation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Moore, D., Shannon, C., Claffy, K.: Code-Red: a case study on the spread and victims of an Internet worm. In: Proc. 2nd Internet Measurement Workshop (IMW 2002), pp. 273–284. ACM Press (November 2002)
Zhou, L.D., Zhang, L.T., McSherry, F., Immorlica, N., Costa, M., Chien, S.: A first look at peer-to-peer worms: threats and defenses. In: van Renesse, R. (ed.) IPTPS 2005. LNCS, vol. 3640, pp. 24–35. Springer, Heidelberg (2005)
Zou, C.C., Gong, W.B., Towsley, D., Gao, L.X.: The monitoring and early detection of Internet worms. IEEE/ACM Transactions on Networking 13, 961–974 (2005)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: ACM SIGCOMM 2001, pp. 149–160. ACM Press (August 2001)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Transactions on Networking 11, 17–32 (2003)
Staniford, S., Paxsony, V., Weaver, N.: How to own the Internet in your spare time. In: Proc. 11th USENIX Security Symposium, San Francisco, CA, pp. 149–167 (August 2002)
Chen, G.L., Gray, R.S.: Simulating non-scanning worms on peer-to-peer networks. In: Proc. 1st International Conference on Scalable Information Systems (InfoScale 2006), pp. 29–41. ACM Press (May 2006)
Zou, C.C., Towsley, D., Gong, W.B.: On the performance of Internet worm scanning strategies. Performance Evaluation 63, 700–723 (2006)
Zou, C.C., Gong, W.B., Towsley, D.: Code red worm propagation modeling and analysis. In: Proc. ACM Conference on Computer and Communications Security, pp. 138–147. ACM Press (November 2002)
Chen, Z.S., Gao, L.X., Kwiat, K.: Modeling the spread of active worms. In: Proc. IEEE INFOCOM, pp. 1890–1900. IEEE Press (March 2003)
Yao, Y., Luo, X.R., Gao, F. X., Ai, S.L.: Research of a potential worm propagation model based on pure p2p principle. In: International Conference on Communication Technology (ICCT 2006), pp. 1–4. IEEE Press (November 2006)
Xiang, F., Yang, X.: Propagation modeling of peer-to-peer worms. In: Proc. 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), pp. 1128–1135. IEEE Press (April 2010)
Wei, Y.: Analyzing the performance of Internet worm attack approaches. In: Proc. 13th International Conference on Computer Communications and Networks (ICCCN 2004), pp. 501–506. IEEE Press (October 2004)
Wei, Y., Corey, B., Sriram, C., Dong, X.: Peer-to-peer system-based active worm attack: modeling and analysis. In: IEEE International Conference on Communications (ICC 2005), pp. 295–299. IEEE Press (May 2005)
Xia, C.H., Shi, Y.P., Li, X.J.: Research on epidemic models of p2p worms in structured peer-to-peer networks. Chinese Journal of Computers 29, 952–959 (2006); Language: Chinese
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this chapter
Cite this chapter
Wang, X., Zhu, J., Lin, H., Su, X., Jiang, Y. (2012). Modeling Propagation of Active P2P Worm in Chord Network. In: Sambath, S., Zhu, E. (eds) Frontiers in Computer Education. Advances in Intelligent and Soft Computing, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27552-4_55
Download citation
DOI: https://doi.org/10.1007/978-3-642-27552-4_55
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27551-7
Online ISBN: 978-3-642-27552-4
eBook Packages: EngineeringEngineering (R0)