Malicious code passive propagation model and vaccine distribution model of P2P networks  被引量:9

Malicious code passive propagation model and vaccine distribution model of P2P networks

在线阅读下载全文

作  者:Xiaolong Xu Ruchuan Wang Fu Xiao 

机构地区:[1]School of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, E R. China [2]State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, P. R. China

出  处:《Journal of Systems Engineering and Electronics》2010年第1期161-167,共7页系统工程与电子技术(英文版)

基  金:supported by the National Natural Science Foundation of China (60573141,60773041);National High Technology Research and Development Program of China (863 Program) (2006AA01Z439;2007AA01Z404; 2007AA01Z478);the Natural Science Foundation of Jiangsu Province (BK2008451);Science & Technology Project of Jiangsu Province (BE2009158);the Natural Science Foundation of Higher Education Institutions of Jiangsu Province (09KJB520010; 09KJB520009);the Research Fund for the Doctoral Program of Higher Education(2009 3223120001);the Sepcialized Research Fund of Ministry of Education (2009117);High Technology Research Program of Nanjing(2007RZ127);Foundation of National Laboratory for Modern Communications (9140C1105040805);Postdoctoral Foundation of Jiangsu Province (0801019C);Science & Technology Innovation Fundfor Higher Education Institutions of Jiangsu Province (CX08B-085Z;CX08B-086Z)

摘  要:To fight against malicious codes of P2P networks, it is necessary to study the malicious code propagation model of P2P networks in depth. The epidemic of malicious code threatening P2P systems can be divided into the active and passive propagation models and a new passive propagation model of malicious code is proposed, which differentiates peers into 4 kinds of state and fits better for actual P2P networks. From the propagation model of malicious code, it is easy to find that quickly making peers get their patched and upgraded anti-virus system is the key way of immunization and damage control. To distribute patches and immune modules efficiently, a new exponential tree plus (ET+) and vaccine distribution algorithm based on ET+ are also proposed. The performance analysis and test results show that the vaccine distribution algorithm based on ET+ is robust, efficient and much more suitable for P2P networks.To fight against malicious codes of P2P networks, it is necessary to study the malicious code propagation model of P2P networks in depth. The epidemic of malicious code threatening P2P systems can be divided into the active and passive propagation models and a new passive propagation model of malicious code is proposed, which differentiates peers into 4 kinds of state and fits better for actual P2P networks. From the propagation model of malicious code, it is easy to find that quickly making peers get their patched and upgraded anti-virus system is the key way of immunization and damage control. To distribute patches and immune modules efficiently, a new exponential tree plus (ET+) and vaccine distribution algorithm based on ET+ are also proposed. The performance analysis and test results show that the vaccine distribution algorithm based on ET+ is robust, efficient and much more suitable for P2P networks.

关 键 词:data security and computer security computer virus peer-to-peer computing PROPAGATION IMMUNE exponential tree. 

分 类 号:TP393[自动化与计算机技术—计算机应用技术] TP393.08[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象