Skip to main content

Modeling Propagation of Active P2P Worm in Chord Network

  • Chapter
Frontiers in Computer Education

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 133))

Abstract

P2P worms utilize the topology of P2P network, gaining a better propagation effect compared with random scanning worm. The active P2P worm is the most destructive P2P worm, which would generate infection target list from P2P nodes’ neighbor information to achieve faster propagation speed and more concealment. Worm propagation in Chord network is special due to the fact that Chord network is structured P2P network. We proposed a propagation model for active P2P worm in Chord network, which fits the structure of Chord. We carry out simulation studies, which indicate that our model is able to describe the propagation of active P2P worm in Chord network well. Further simulation shows that worm takes extremely short time to infect the whole Chord network, suggesting that Chord network is a nice environment for worm propagation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moore, D., Shannon, C., Claffy, K.: Code-Red: a case study on the spread and victims of an Internet worm. In: Proc. 2nd Internet Measurement Workshop (IMW 2002), pp. 273–284. ACM Press (November 2002)

    Google Scholar 

  2. Zhou, L.D., Zhang, L.T., McSherry, F., Immorlica, N., Costa, M., Chien, S.: A first look at peer-to-peer worms: threats and defenses. In: van Renesse, R. (ed.) IPTPS 2005. LNCS, vol. 3640, pp. 24–35. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Zou, C.C., Gong, W.B., Towsley, D., Gao, L.X.: The monitoring and early detection of Internet worms. IEEE/ACM Transactions on Networking 13, 961–974 (2005)

    Article  Google Scholar 

  4. Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: ACM SIGCOMM 2001, pp. 149–160. ACM Press (August 2001)

    Google Scholar 

  5. Stoica, I., Morris, R., Liben-Nowell, D., Karger, D., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for Internet applications. IEEE/ACM Transactions on Networking 11, 17–32 (2003)

    Article  Google Scholar 

  6. Staniford, S., Paxsony, V., Weaver, N.: How to own the Internet in your spare time. In: Proc. 11th USENIX Security Symposium, San Francisco, CA, pp. 149–167 (August 2002)

    Google Scholar 

  7. Chen, G.L., Gray, R.S.: Simulating non-scanning worms on peer-to-peer networks. In: Proc. 1st International Conference on Scalable Information Systems (InfoScale 2006), pp. 29–41. ACM Press (May 2006)

    Google Scholar 

  8. Zou, C.C., Towsley, D., Gong, W.B.: On the performance of Internet worm scanning strategies. Performance Evaluation 63, 700–723 (2006)

    Article  Google Scholar 

  9. Zou, C.C., Gong, W.B., Towsley, D.: Code red worm propagation modeling and analysis. In: Proc. ACM Conference on Computer and Communications Security, pp. 138–147. ACM Press (November 2002)

    Google Scholar 

  10. Chen, Z.S., Gao, L.X., Kwiat, K.: Modeling the spread of active worms. In: Proc. IEEE INFOCOM, pp. 1890–1900. IEEE Press (March 2003)

    Google Scholar 

  11. Yao, Y., Luo, X.R., Gao, F. X., Ai, S.L.: Research of a potential worm propagation model based on pure p2p principle. In: International Conference on Communication Technology (ICCT 2006), pp. 1–4. IEEE Press (November 2006)

    Google Scholar 

  12. Xiang, F., Yang, X.: Propagation modeling of peer-to-peer worms. In: Proc. 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), pp. 1128–1135. IEEE Press (April 2010)

    Google Scholar 

  13. Wei, Y.: Analyzing the performance of Internet worm attack approaches. In: Proc. 13th International Conference on Computer Communications and Networks (ICCCN 2004), pp. 501–506. IEEE Press (October 2004)

    Google Scholar 

  14. Wei, Y., Corey, B., Sriram, C., Dong, X.: Peer-to-peer system-based active worm attack: modeling and analysis. In: IEEE International Conference on Communications (ICC 2005), pp. 295–299. IEEE Press (May 2005)

    Google Scholar 

  15. Xia, C.H., Shi, Y.P., Li, X.J.: Research on epidemic models of p2p worms in structured peer-to-peer networks. Chinese Journal of Computers 29, 952–959 (2006); Language: Chinese

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuesong Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this chapter

Cite this chapter

Wang, X., Zhu, J., Lin, H., Su, X., Jiang, Y. (2012). Modeling Propagation of Active P2P Worm in Chord Network. In: Sambath, S., Zhu, E. (eds) Frontiers in Computer Education. Advances in Intelligent and Soft Computing, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27552-4_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27552-4_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27551-7

  • Online ISBN: 978-3-642-27552-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics