Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions
-
Published:2023-04-06
Issue:7
Volume:13
Page:4625
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Sánchez-Patiño Natalia1, Gallegos-Garcia Gina2ORCID, Rivero-Angeles Mario E.2ORCID
Affiliation:
1. Facultad de Informática de Barcelona, Universidad Politécnica de Cataluña, Carrer de Jordi Girona, 31, 08034 Barcelona, Spain 2. Centro de Investigación en Computación, Instituto Politécnico Nacional, Av. Juan de Dios Bátiz S/N, Nueva Industrial Vallejo, Gustavo A. Madero, Ciudad de México 07738, Mexico
Abstract
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, this communication model also has a clear disadvantage: it has a multitude of vulnerabilities and security threats. The nature of the P2P philosophy itself means that there is no centralized server responsible for uploading, storing, and verifying the authenticity of the shared files and packets. A direct consequence of this is that P2P networks are a good choice for hackers for the spread of malicious software or malware in general since there is no mechanism to control what content is shared. In this paper, we present a mathematical model for P2P networks to study the effect of two different attacks on these systems, namely, malware and denial of service. To analyze the behavior of the cyber attacks and identify important weaknesses, we develop different Markov chains that reflect the main dynamics of the system and the attacks. Specifically, our model considers the case in which a certain number of nodes are infected with a cyber worm that is spread throughout the network as the file is shared among peers. This allows observation of the final number of infected peers when an initial number (we evaluate the system for from 1 to 14 initial nodes) of malicious nodes infect the system. For the DoS attack, our model considers the portion of peers that are unable to communicate and the average attack duration to study the performance degradation of such an attack. A two-pronged approach was used to study the impact of the attacks on P2P networks; the first focused only on the P2P network, and the second focused on the attacks and the network.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference57 articles.
1. Quang Hieu, V., and Mihai Lupu, B.C.O. (2010). Peer-to-Peer Computing: Principles and Applications, Springer. 2. Esquivel, E.E.B., Rivero-Angeles, M.E., and Fernandez-Vazquez, A. (2014, January 13–16). Priority scheme for mobile nodes in P2P bit-torrent based networks. Proceedings of the 2014 28th International Conference on Advanced Information Networking and Applications Workshops, Victoria, BC, Canada. 3. Combating index poisoning in P2P file sharing;Deng;Adv. Inf. Secur. Assur.,2009 4. Wang, W., and Zhao, W. (2015, January 29–31). Model the P2P Attack in Computer Networks. Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science, Shenyang, China. 5. Jin, X., and Chan, S.H.G. (2010). Handbook of Peer-to-Peer Networking, Springer.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|