Please use this identifier to cite or link to this item:
Title: Modeling and defending against adaptive bittorrent worms in peer-to-peer networks
Authors: Luo, J
Xiao, B 
Xiao, Q
Cao, J 
Guo, M
Issue Date: 2014
Publisher: Association for Computing Machinery
Source: ACM Transactions on autonomous and adaptive systems, 2014, v. 9, no. 1, 5 How to cite?
Journal: ACM Transactions on Autonomous and Adaptive Systems 
Abstract: In this article, we present a novel P2P worm, called Adaptive BitTorrent worm (A-BT worm), in BT-like networks, which propagates itself by requesting a tracker for vulnerable peers. We believe that such a worm could pose a vital threat to the P2P security for the following reasons: (1) it has the ability to locate most recent active peers; (2) it is easy to be implemented; (3) it can adaptively adjust its speed to reduce its abnormal behavior. By combining the fluid model with the epidemic model, we build a hybrid model to measure the worm damage. We also discuss the possible strategies to detect and contain the worm.
ISSN: 1556-4665
DOI: 10.1145/2567925
Appears in Collections:Journal/Magazine Article

View full-text via PolyU eLinks SFX Query
Show full item record

Page view(s)

Last Week
Last month
Citations as of Dec 10, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.