The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2011 vol.8)
pp: 617-623
Krishna K. Ramachandran , Rensselaer Polytechnic Institute, Troy
Biplab Sikdar , Rensselaer Polytechnic Institute, Troy
In this paper, we formulate an analytical model to characterize the spread of malware in decentralized, Gnutella type peer-to-peer (P2P) networks and study the dynamics associated with the spread of malware. Using a compartmental model, we derive the system parameters or network conditions under which the P2P network may reach a malware free equilibrium. The model also evaluates the effect of control strategies like node quarantine on stifling the spread of malware. The model is then extended to consider the impact of P2P networks on the malware spread in networks of smart cell phones.
Malware propagation, peer-to-peer networks, Internet worms and viruses.
Krishna K. Ramachandran, Biplab Sikdar, "Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks", IEEE Transactions on Dependable and Secure Computing, vol.8, no. 4, pp. 617-623, July/August 2011, doi:10.1109/TDSC.2010.69
[1] Clip2, “The Gnutella Protocol Specification v0.4,” http://www.clip2.comGnutellaProtocol04.pdf , Mar. 2001.
[2] E. Damiani, D. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, “A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks,” Proc. ACM Conf. Computer and Comm. Security (CCS), pp. 207-216, Nov. 2002.
[3] X. Yang and G. de Veciana, “Service Capacity in Peer-to-Peer Networks,” Proc. IEEE INFOCOM '04, pp. 1-11, Mar. 2004.
[4] D. Qiu and R. Srikant, “Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks,” Proc. ACM SIGCOMM, Aug. 2004.
[5] J. Mundinger, R. Weber, and G. Weiss, “Optimal Scheduling of Peer-to-Peer File Dissemination,” J. Scheduling, vol. 11, pp. 105-120, 2007.
[6] A. Bose and K. Shin, “On Capturing Malware Dynamics in Mobile Power-Law Networks,” Proc. ACM Int'l Conf. Security and Privacy in Comm. Networks (SecureComm), pp. 1-10, Sept. 2008.
[7] L. Zhou, L. Zhang, F. McSherry, N. Immorlica, M. Costa, and S. Chien, “A First Look at Peer-to-Peer Worms: Threats and Defenses,” Int'l Workshop Peer-To-Peer Systems, Feb. 2005.
[8] F. Wang, Y. Dong, J. Song, and J. Gu, “On the Performance of Passive Worms over Unstructured P2P Networks,” Proc. Int'l Conf. Intelligent Networks and Intelligent Systems (ICINIS), pp. 164-167, Nov. 2009.
[9] R. Thommes and M. Coates, “Epidemiological Models of Peer-to-Peer Viruses and Pollution,” Proc. IEEE INFOCOM '06, Apr. 2006.
[10] J. Schafer and K. Malinka, “Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent,” Proc. IEEE Int'l Conf. Internet Monitoring and Protection (ICIMP '09), pp. 39-44, May 2009.
[11] J. Luo, B. Xiao, G. Liu, Q. Xiao, and S. Zhou, “Modeling and Analysis of Self-Stopping BT Worms Using Dynamic Hit List in P2P Networks,” Proc. IEEE Int'l Symp. Parallel and Distributed Processing (IPDPS '09), May 2009.
[12] W. Yu, S. Chellappan, X. Wang, and D. Xuan, “Peer-to-Peer System-Based Active Worm Attacks: Modeling, Analysis and Defense,” Computer Comm., vol. 31, no. 17, pp. 4005-4017, Nov. 2008.
[13] A. Ganesh, L. Massoulie, and D. Towsley, “The Effect of Network Topology on the Spread of Epidemics,” Proc. IEEE INFOCOM, 2005.
[14] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, “Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint,” Proc. IEEE Int'l Symp. Reliable Distributed Systems (SRDS), 2003.
[15] M. Newman, S. Strogatz, and D. Watts, “Random Graphs with Arbitrary Degree Distribution and Their Applications,” Physical Rev. E, vol. 64, no. 2, pp. 026118(1-17), July 2001.
[16] D. Stutzbach and R. Rejaie, “Characterizing the Two-Tier Gnutella Topology,” Proc. ACM Int'l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS), pp. 402-403, June 2005.
[17] R. Pastor-Satorras and A. Vespignani, “Epidemic Dynamics in Scale-Free Networks,” Physical Rev. E, vol. 65, no. 3, p. 035108(1-4), Mar. 2002.
[18] O. Diekmann and J. Heesterbeek, Mathematical Epidemiology of Infectious Diseases: Model Building, Analysis and Interpretation. Wiley, 1999.
[19] P. van den Driessche and J. Watmough, “Reproduction Numbers and Sub-Threshold Endemic Equilibria for Compartmental Models of Disease Transmission,” Math. Biosciences, vol. 180, pp. 29-48, 2002.
[20] J. Arnio, J. Davis, D. Hartley, R. Jordan, J. Miller, and P. van den Driessche, “A Multi-Species Epidemic Model with Spatial Dynamics,” Math. Medicine and Biology, vol. 22, pp. 129-142, Mar. 2005.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool