By Topic

Modeling Passive Worm Propagation in Peer-to-Peer System

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jie Ma ; Comput. Coll., Wuhan Univ. ; Xinmeng Chen ; Guangli Xiang

In recent years, active worm propagation patterns have been researched deeply. However, passive worm propagation has not been inspected in detail. Passive worms propagate slowly in Internet, but P2P system can be a potential vehicle to fast the propagation of passive worm. In this paper, we address the issue by analyzing the passive worm propagation model in P2P systems. We define passive worm propagation model and use numerical analysis approach to analyze the impact of P2P-related factors such as number of P2P system vulnerability, P2P system changing rate, P2P system security parameters and average connections of P2P hosts and give numerical results. From numerical results, we observe that attack performance of passive worm is very sensitive to P2P system parameters

Published in:

Computational Intelligence and Security, 2006 International Conference on  (Volume:2 )

Date of Conference:

3-6 Nov. 2006