Visible to the public Simulating Worm Propagation in Interconnected Peer-to-Peer Networks

TitleSimulating Worm Propagation in Interconnected Peer-to-Peer Networks
Publication TypeConference Paper
Year of Publication2018
AuthorsRguibi, Mohamed Amine, Moussa, Najem
Conference Name2018 International Conference on Advanced Communication Technologies and Networking (CommNet)
PublisherIEEE
ISBN Number978-1-5386-4609-0
Keywordsattacking networks, Communication systems, competitive networks, Fault tolerance, Grippers, Human Behavior, human factor, human factors, interconnected networks, Mathematical model, Metrics, Peer to Peer, peer to peer security, Peer-to-peer computing, peer-to-peer network, protected network, pubcrawl, resilience, Resiliency, Safety, Scalability, security, Servers, simulation, Synapses, unprotected network, worm propagation
Abstract

Peer-to-peer computing (P2P) refers to the famous technology that provides peers an equal spontaneous collaboration in the network by using appropriate information and communication systems without the need for a central server coordination. Today, the interconnection of several P2P networks has become a genuine solution for increasing system reliability, fault tolerance and resource availability. However, the existence of security threats in such networks, allows us to investigate the safety of users from P2P threats by studying the effects of competition between these interconnected networks. In this paper, we present an e-epidemic model to characterize the worm propagation in an interconnected peer-to-peer network. Here, we address this issue by introducing a model of network competition where an unprotected network is willing to partially weaken its own safety in order to more severely damage a more protected network. The unprotected network can infect all peers in the competitive networks after their non react against the passive worm propagation. Our model also evaluated the effect of an immunization strategies adopted by the protected network to resist against attacking networks. The launch time of immunization strategies in the protected network, the number of peers synapse connected to the both networks, and other effective parameters have also been investigated in this paper.

URLhttps://ieeexplore.ieee.org/document/8360274
DOI10.1109/COMMNET.2018.8360274
Citation Keyrguibi_simulating_2018