Skip to main content

Advertisement

Log in

The impact of hesitation on passive worm spreading in P2P networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

P2P file-sharing networks allow peers (computers) to download files and make them available to other users on the network. The fear of downloading worm file is a reasonable reason to discourage users to utilize P2P file-sharing networks. So, peers may hesitate to open the downloaded files due to the concern of receiving poisoned files or being compromised by malwares. In this article, we present a model of spread of passive worm in P2P file-sharing networks, where susceptible peers which were already infected before, are reluctant to open new downloaded files. Here, we address this issue by introducing a modified SEIS model, where λ e (average rate at which exposed peer opens a downloaded file) decreases with the number of reinfections n for a maximum of times (λ e (n+1) = 𝜖 λ e (n)where 0<𝜖<1represents the hesitation value). Hence, for a susceptible peer which was already infected by the worm, the hesitation to open a new downloaded file is quantified by the two parameters (𝜖,). We studied numerically the effects of various system parameters on the time evolution of the peer states. At steady state and for every value of , there exists a critical value 𝜖 c below which the system is infection-free. A phase diagram in the plane (𝜖,) is constructed that shows which phases are present according to the state variables. In addition, we introduced and evaluated the effect of different patch-based immunization strategies to show how they could block the spread of the worm in the system. The immunization patch is launched in the network at a time t l and will be out of order at a time t f (i.e. outdated patch). We found that the parameters (t l ,t f , 𝜖) are very important to be defined when developing the immunization patch.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Wu J (ed) (2005) Handbook On Theoretical And Algorithmic Aspects Of Sensor, Ad Hoc Wireless, and Peer-toPeer Networks. Auerbach Publications, MA, USA

  2. Delgado R (2004) Law professors examine ethical controversies of peer-to-peer file sharing. Stanford Report, p 17

  3. Ernesto (2015) BitTorrent still dominates internets upstream traffic. Sandvine Report, p 8

  4. Bowden M (2011) Worm: The first digital world war. Grove/Atlantic, Inc.

  5. Yu W, Zhang N, Zhao W (2006) SelfAdaptive Worms and Countermeasures. In: 8th International Symposium on Stabilization, Safety, and Security of Distributed Systems

  6. Chen ZS, Gao LX, Kwiat K (2003) Modeling the spread of active worms. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM), San Francisco, CA

  7. Staniford S, Paxson V, Weaver N (2002) How to own the internet in your spare time. In: Proceedings of the 11-th USENIX Security Symposium, San Francisco, CA

  8. Thommes RW, Coates MJ (2005) Modeling virus propagation in peer-to-peer networks. In: Proceedings Fifth International Conference on Information, Communications and Signal Processing, p 981

  9. Fangwei W, Zhang Y, Ma J (2009) Defending passive worms in unstructured P2P networks based on healthy file dissemination. Comput Secur 28(7):628–636

    Article  Google Scholar 

  10. Elnaz M, Azgomi M (2015) Modeling the propagation of topology-aware P2P worms considering temporal parameters. Peer-to-Peer Netw Appl 8:171

    Article  Google Scholar 

  11. Ting C, Zhang X, Wu Y (2014) FPM: four-factors propagation model for passive P2P worms. Fut Gener Comput Syst 36:133

    Article  Google Scholar 

  12. Chao-sheng F, Yang J, Qin Z, Yuan D, Cheng H (2015) Modeling and analysis of passive worm propagation in the P2P file-sharing network. Simul Modell Pract Theory 51:87

    Article  Google Scholar 

  13. Mishra BK, Pandey SK (2014) Dynamic model of worm propagation in computer network. Appl Math Modell 38:2173

    Article  MathSciNet  Google Scholar 

  14. Jafarabadi A, Azgomi MA (2015) A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology. Peer-to-Peer Netw Appl 8:1008

    Article  Google Scholar 

  15. Gilligan CA, Gubbins S, Simons SA (1997) Analysis and fitting of an SIR model with host response to infection load for a plant disease. Philos Trans R Soc Lond B Biol Sci 352:353

    Article  Google Scholar 

  16. Vaidya NK et al (2010) Viral dynamics during primary simian immunodeficiency virus infection: effect of time-dependent virus infectivity. J Virol 84:4302

    Article  Google Scholar 

  17. Crokidakis N, De Menezes MA (2012) Critical behavior of the SIS epidemic model with time-dependent infection rate. J Stat Mech: Theory Exper 2012:P05012

    Google Scholar 

  18. Feng C-s et al (2015) Modeling and analysis of passive worm propagation in the P2P file-sharing network. Simul Modell Pract Theory 51:87–99

    Article  Google Scholar 

  19. Watts DJ, Strogatz SH (1998) Collective dynamics of ‘small-world’ networks. Nature 393:440

    Article  MATH  Google Scholar 

  20. Zhu Y, Zhang F, Guo W (2014) An immunization strategy based on propagation mechanism. Discr Dyn Nat Soc 2014

  21. Zou CC, Gong W, Towsley D (2002) Code red worm propagation modeling and analysis. Proceedings of the 9th ACM conference on Computer and communications security. ACM

  22. Wang F et al (2009) On the performance of passive worms over unstructured P2P networks. In: 2009. ICINIS’09. Second International Conference on Intelligent Networks and Intelligent Systems. IEEE

  23. Ramachandran K, Sikdar B (2006) Modeling malware propagation in Gnutella type peer-to-peer networks. Proceedings 20th IEEE International Parallel & Distributed Processing Symposium. IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Najem Moussa.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rguibi, M.A., Moussa, N. The impact of hesitation on passive worm spreading in P2P networks. Peer-to-Peer Netw. Appl. 11, 397–408 (2018). https://doi.org/10.1007/s12083-016-0538-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0538-0

Keywords

Navigation