Simulating Worm Propagation in Interconnected Peer-to-Peer Networks
Title | Simulating Worm Propagation in Interconnected Peer-to-Peer Networks |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Rguibi, Mohamed Amine, Moussa, Najem |
Conference Name | 2018 International Conference on Advanced Communication Technologies and Networking (CommNet) |
Publisher | IEEE |
ISBN Number | 978-1-5386-4609-0 |
Keywords | attacking networks, Communication systems, competitive networks, Fault tolerance, Grippers, Human Behavior, human factor, human factors, interconnected networks, Mathematical model, Metrics, Peer to Peer, peer to peer security, Peer-to-peer computing, peer-to-peer network, protected network, pubcrawl, resilience, Resiliency, Safety, Scalability, security, Servers, simulation, Synapses, unprotected network, worm propagation |
Abstract | Peer-to-peer computing (P2P) refers to the famous technology that provides peers an equal spontaneous collaboration in the network by using appropriate information and communication systems without the need for a central server coordination. Today, the interconnection of several P2P networks has become a genuine solution for increasing system reliability, fault tolerance and resource availability. However, the existence of security threats in such networks, allows us to investigate the safety of users from P2P threats by studying the effects of competition between these interconnected networks. In this paper, we present an e-epidemic model to characterize the worm propagation in an interconnected peer-to-peer network. Here, we address this issue by introducing a model of network competition where an unprotected network is willing to partially weaken its own safety in order to more severely damage a more protected network. The unprotected network can infect all peers in the competitive networks after their non react against the passive worm propagation. Our model also evaluated the effect of an immunization strategies adopted by the protected network to resist against attacking networks. The launch time of immunization strategies in the protected network, the number of peers synapse connected to the both networks, and other effective parameters have also been investigated in this paper. |
URL | https://ieeexplore.ieee.org/document/8360274 |
DOI | 10.1109/COMMNET.2018.8360274 |
Citation Key | rguibi_simulating_2018 |
- Peer-to-peer computing
- worm propagation
- unprotected network
- Synapses
- simulation
- Servers
- security
- Scalability
- Safety
- Resiliency
- resilience
- pubcrawl
- protected network
- peer-to-peer network
- attacking networks
- peer to peer security
- Peer to Peer
- Metrics
- Mathematical model
- interconnected networks
- Human Factors
- human factor
- Human behavior
- Grippers
- fault tolerance
- competitive networks
- Communication Systems