Journal of Systems Engineering and Electronics ›› 2010, Vol. 21 ›› Issue (1): 161-167.doi: 10.3969/j.issn.1004-4132.2010.01.026

• COMPUTER DEVELOPMENT AND PRACTICE • Previous Articles     Next Articles

Malicious code passive propagation model and vaccine distribution model of P2P networks

Xiaolong Xu1, Ruchuan Wang1,2,∗, and Fu Xiao1   

  1. 1. School of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, P. R. China;
    2. State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, P. R. China
  • Online:2010-02-26 Published:2010-01-03
  • Supported by:

    This work was supported by the National Natural Science Foundation
    of China (60573141,60773041), National High Technology Research
    and Development Program of China (863 Program) (2006AA01Z439;
    2007AA01Z404; 2007AA01Z478), the Natural Science Foundation of
    Jiangsu Province (BK2008451), Science & Technology Project of Jiangsu
    Province (BE2009158), the Natural Science Foundation of Higher Education
    Institutions of Jiangsu Province (09KJB520010; 09KJB520009), et al.

Abstract:

To fight against malicious codes of P2P networks, it is necessary to study the malicious code propagation model of P2P networks in depth. The epidemic of malicious code threatening P2P systems can be divided into the active and passive propagation models and a new passive propagation model of malicious code is proposed, which differentiates peers into 4 kinds of state and fits better for actual P2P networks. From the propagation model of malicious code, it is easy to find that quickly making peers get their patched and upgraded anti-virus system is the key way of immunization and damage control. To distribute patches and immune modules efficiently, a new exponential tree plus (ET+) and vaccine distribution algorithm based on ET+ are also proposed. The performance analysis and test results show that the vaccine distribution algorithm based on ET+ is robust, efficient and much more suitable for P2P networks.