The probability model of peer-to-peer botnet propagation

Wang, Yini, Wen, Sheng, Zhou, Wei, Zhou, Wanlei and Xiang, Yang 2011, The probability model of peer-to-peer botnet propagation, in Algorithms and architectures for parallel processing : 11th International Conference, ICA3PP 2011, Melbourne, Australia, October 24-26, 2011 : proceedings, part I, Springer-Verlag, Berlin, Germany, pp.470-480.

Attached Files
Name Description MIMEType Size Downloads

Title The probability model of peer-to-peer botnet propagation
Author(s) Wang, Yini
Wen, Sheng
Zhou, Wei
Zhou, Wanlei
Xiang, Yang
Title of book Algorithms and architectures for parallel processing : 11th International Conference, ICA3PP 2011, Melbourne, Australia, October 24-26, 2011 : proceedings, part I
Editor(s) Xiang, Yang
Cuzzocrea, Alfredo
Hobbs, Michael
Zhou, Wanlei
Publication date 2011
Series Lecture notes in computer science ; 7016
Chapter number 41
Total chapters 42
Start page 470
End page 480
Total pages 11
Publisher Springer-Verlag
Place of Publication Berlin, Germany
Keyword(s) botnet
peer-to-peer
propagation probability
worms
Summary Active Peer-to-Peer worms are great threat to the network security since they can propagate in automated ways and flood the Internet within a very short duration. Modeling a propagation process can help us to devise effective strategies against a worm's spread. This paper presents a study on modeling a worm's propagation probability in a P2P overlay network and proposes an optimized patch strategy for defenders. Firstly, we present a probability matrix model to construct the propagation of P2P worms. Our model involves three indispensible aspects for propagation: infected state, vulnerability distribution and patch strategy. Based on a fully connected graph, our comprehensive model is highly suited for real world cases like Code Red II. Finally, by inspecting the propagation procedure, we propose four basic tactics for defense of P2P botnets. The rationale is exposed by our simulated experiments and the results show these tactics are of effective and have considerable worth in being applied in real-world networks.
ISBN 3642246508
9783642246500
ISSN 0302-9743
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890201 Application Software Packages (excl. Computer Games)
HERDC Research category B1 Book chapter
Copyright notice ©2011, Springer-Verlag
Persistent URL http://hdl.handle.net/10536/DRO/DU:30043172

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 109 Abstract Views, 15 File Downloads  -  Detailed Statistics
Created: Tue, 13 Mar 2012, 09:50:56 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.