2011
DOI: 10.4304/jnw.6.1.153-162
|View full text |Cite
|
Sign up to set email alerts
|

Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense

Abstract: The propagation of P2P worm covers large area and causes great damage. A Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…The first step is to initialize the number of online nodes in all states during a first time period, the second step is to calculate the change in numbers of online nodes in all states during the same period of time according to the formula (11)(12)(13)(14)(15), the third step is to reckon the actual number of online nodes during a second time period according to the formula (10), the fourth step is to initialize the number of online nodes in all states during a second time period according to the proportion of different states of online nodes that has been calculated in second step and the actual number of online nodes that has been reckon in third step, then the change in numbers of online nodes in all states during the second period of time can be calculated in the fifth step, The rest can be done in the same manner, until the number change of online nodes in all states for 24 hours within a day has been calculated.…”
Section: Numerical Simulation and Analysis Of Defense Model Based mentioning
confidence: 99%
See 1 more Smart Citation
“…The first step is to initialize the number of online nodes in all states during a first time period, the second step is to calculate the change in numbers of online nodes in all states during the same period of time according to the formula (11)(12)(13)(14)(15), the third step is to reckon the actual number of online nodes during a second time period according to the formula (10), the fourth step is to initialize the number of online nodes in all states during a second time period according to the proportion of different states of online nodes that has been calculated in second step and the actual number of online nodes that has been reckon in third step, then the change in numbers of online nodes in all states during the second period of time can be calculated in the fifth step, The rest can be done in the same manner, until the number change of online nodes in all states for 24 hours within a day has been calculated.…”
Section: Numerical Simulation and Analysis Of Defense Model Based mentioning
confidence: 99%
“…Qin et al and Feng et al respectively modeled the propagation process and immune process of reactive worms on the basis of Kermack-Mckendrick model [10] [11], and also the prevalence condition of reactive worms was presented in these papers, pointing out the direction for defending against reactive worms in P2P environment. Yang et al designed a dynamic quarantine protocol to defend active worms in P2P networks by quarantining the suspicious hosts, and he developed a mathematical model of PWPQ to prove the effectiveness of this defense method [12]. Ouyang et al analyzed the trust mechanism and application model, set up a new kind of trust model based on P2P network [13], the simulation experiment showed this trust model helps improve the success rate of transaction.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, this type of quarantine is innefficient, due to the high values of the rate at which new hosts entering the network are patched. Dynamic quarantine methods, based on the principle 'assume guilty before proven innocent' have been proposed to mitigate this problem [14,9,12]. This dynamic quarantine method diminishes the negative effect of false alarms, produced by worm anomaly detection systems.…”
Section: Introductionmentioning
confidence: 99%
“…And they are residing by erasing data, damage files, or modifying the normal operation. In recent years, some models of the computer virus is proposed [1][2][3][5][6][7][8][9][10][11][12]. The action of computer virus throughout a network can be studied by using epidemiological models for disease propagation [4].…”
Section: Introductionmentioning
confidence: 99%