Type of Material: | Thesis |
Title: | DYNAMICS OF MALWARE SPREAD IN DECENTRALIZED PEER TO PEER NETWORKS |
Researcher: | V.RAVIKUMAR |
Guide: | M.RAJANI |
Department: | Department of Engineering and Technology(Computer Science and Engineering) |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2011 |
Language: | English |
Subject: | Content Addressable Networks | Chord | Computer Science and Information Technology | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2011; D08CS021 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454551 | |
003 | IN-AhILN | |
005 | 2024-09-13 16:02:40 | |
008 | __ | 240913t2011||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454551 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aV.RAVIKUMAR|eResearcher |
110 | __ | |aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein |
245 | __ | |aDYNAMICS OF MALWARE SPREAD IN DECENTRALIZED PEER TO PEER NETWORKS |
260 | __ | |aChennai|bBharath University, Chennai|c2011 |
300 | __ | |dDVD |
502 | __ | |cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2011|oD08CS021|bPhD |
518 | __ | |oDate of Registration|d2008-01-14 |
520 | __ | |aIn this paper, we formulate an analytical model to characterize the spread of malware in decentralized peer-to-peer (P2P) networks and study the dynamics associated with the spread of malware. Using a compartmental model, we derive the system parameters or network conditions under which the P2P network may reach a malware free equilibrium. The model also evaluates the effect of control strategies like node quarantine on stifling the spread of malware. The model is then extended to consider the impact of P2P networks on the malware spread in networks. The use of peer-to-peer (P2P) networks as a vehicle to spread malware offers some important advantages over worms that spread by scanning for vulnerable hosts. This is primarily due to the methodology employed by the peers to search for content. For instance, in decentralized P2P architectures such as Gnutella where search is done by flooding the network, a peer forwards the query to it s immediate neighbors and the process is repeated until a specified thresho |
650 | __ | |aComputer Science and Information Technology|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aContent Addressable Networks |
653 | __ | |aChord |
700 | __ | |aM.RAJANI|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/170902|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.