Abstract
Hierarchical peer to peer Network Management Systems are attracting a surge of interest in recent years. However, due to their special characteristics, they are more vulnerable to active worm propagations in comparison to current network management systems. In this paper, we study the speed of active worm propagation in a typical hierarchical P2P based network management system from an analytical point of view. Numerical study of the proposed model then is invoked to analyze the propagation process and study the impact of different factors including system size, node type and connection degree.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Granville, L.Z., da Rosa, D.M., Panisson, A., Melchiors, C., Almeida, M.J.B., Tarouco, L.M.R.: Managing computer networks using peer-to-peer technologies. IEEE Communications Magazine 43, 62–68 (2005)
Arozarena, P., Frints, M., Collins, S., Fallon, L., Zach, M., Serrat, J., Nielsen, J.: Madeira: a peer-to-peer approach to network management. In: Proceedings of the Wireless World Research Forum, Shanghai, China (2006)
Saadat, Z.Z., Yousefi, S., Fathy, M.: Active Worm Propagation inHierarchical Peer-to-Peer Network Management Systems. In: Proceeding of the Second International Conference on Communication Theory, Reliability, and Quality of Service, France, pp. 52–57. IEEE computer society, Los Alamitos (2009)
Lia, T., Guan, Z., Wu, X.: Modeling and analyzing the spread of active worms based on P2P systems. Computers and Security 26(3), 213–218 (2007)
Yu, W., Boyer, C., Chellappan, S., Xuan, D.: Peer-to-peer system-based active worm attacks: modeling and analysis. In: IEEE International Conference, vol. 1(16-20), pp. 295–300 (2005)
Ma, J., Chen, X., Xiang, G.: Modeling Passive Worm Propagation in Peer-to-Peer System. In: 2006 International Conference on Computational Intelligence and Security, vol. 2(3-6), pp. 1129–1132 (2006)
Chen, G., Gray, R.S.: Simulating non-scanning worms on peer-to-peer networks. In: ACM International Conference Proceeding Series: Proceedings of the 1st international conference on Scalable information systems, vol. 152, Article No. 29 (2006)
Yao, Y., Luo, X., Gao, F., Ai, S.: Research of a Potential Worm Propagation Model based on Pure P2P Principle. In: ICCT 2006, International Conference Proceeding Series: Proceedings of the 1st international conference on Computer, pp. 1–4 (2006)
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup protocol for internet application. IEEE/ACM Transactions on Networking (TON) 11(1), 17–32 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saadat, Z.Z., Yousefi, S., Fathy, M. (2009). Active Worm Propagation in Hierarchical Peer-to-Peer Network Management Systems: Modeling and Analysis. In: Ślęzak, D., Kim, Th., Chang, A.CC., Vasilakos, T., Li, M., Sakurai, K. (eds) Communication and Networking. FGCN 2009. Communications in Computer and Information Science, vol 56. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10844-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-10844-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10843-3
Online ISBN: 978-3-642-10844-0
eBook Packages: Computer ScienceComputer Science (R0)