You are not logged in.

The probability model of peer-to-peer botnet propagation

Wang, Yini, Wen, Sheng, Zhou, Wei, Zhou, Wanlei and Xiang, Yang 2011, The probability model of peer-to-peer botnet propagation, in ICA3PP 2011 : Proceedings of the 11th Algorithms and Architectures for Parallel Processing International Conference, Springer-Verlag, Berlin, Germany, pp. 470-480.

Attached Files
Name Description MIMEType Size Downloads

Title The probability model of peer-to-peer botnet propagation
Author(s) Wang, Yini
Wen, Sheng
Zhou, Wei
Zhou, Wanlei
Xiang, Yang
Conference name Algorithms and Architectures for Parallel Processing. Conference (11th : 2011 : Melbourne, Victoria)
Conference location Melbourne, Victoria
Conference dates 24-26 Oct. 2011
Title of proceedings ICA3PP 2011 : Proceedings of the 11th Algorithms and Architectures for Parallel Processing International Conference
Editor(s) Xiang, Yang
Cuzzocrea, Alfredo
Hobbs, Michael
Zhou, Wanlei
Publication date 2011
Series Lecture notes in computer science ; 7016
Conference series Algorithms and Architectures for Parallel Processing Conference
Start page 470
End page 480
Total pages 11
Publisher Springer-Verlag
Place of publication Berlin, Germany
Keyword(s) botnet
propagation probability
Summary Active Peer-to-Peer worms are great threat to the network security since they can propagate in automated ways and flood the Internet within a very short duration. Modeling a propagation process can help us to devise effective strategies against a worm's spread. This paper presents a study on modeling a worm's propagation probability in a P2P overlay network and proposes an optimized patch strategy for defenders. Firstly, we present a probability matrix model to construct the propagation of P2P worms. Our model involves three indispensible aspects for propagation: infected state, vulnerability distribution and patch strategy. Based on a fully connected graph, our comprehensive model is highly suited for real world cases like Code Red II. Finally, by inspecting the propagation procedure, we propose four basic tactics for defense of P2P botnets. The rationale is exposed by our simulated experiments and the results show these tactics are of effective and have considerable worth in being applied in real-world networks.
ISBN 3642246508
ISSN 0302-9743
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890201 Application Software Packages (excl. Computer Games)
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2011, Springer-Verlag
Persistent URL

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 251 Abstract Views, 19 File Downloads  -  Detailed Statistics
Created: Tue, 13 Mar 2012, 09:50:56 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact