BRADFORD SCHOLARS

    • Sign in
    View Item 
    •   Bradford Scholars
    • Engineering and Informatics
    • Engineering and Informatics Publications
    • View Item
    •   Bradford Scholars
    • Engineering and Informatics
    • Engineering and Informatics Publications
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of Bradford ScholarsCommunitiesAuthorsTitlesSubjectsPublication DateThis CollectionAuthorsTitlesSubjectsPublication Date

    My Account

    Sign in

    HELP

    Bradford Scholars FAQsCopyright Fact SheetPolicies Fact SheetDeposit Terms and ConditionsDigital Preservation Policy

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Malware Propagation Modelling in Peer-to-Peer Networks: A Review

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    View/Open
    Main article (133.1Kb)
    Download
    Publication date
    2018
    Author
    Musa, Ahmad S.
    Al-Mohannadi, Hamad
    Alhamar, J.
    Keyword
    Malware
    Propagation
    Malware spread
    Peer-to-Peer (P2P)
    Susceptible-Infected-Removed model (SIR model)
    Propagation analysis
    Rights
    © 2018 IEEE. Reproduced in accordance with the publisher's self-archiving policy.
    Peer-Reviewed
    yes
    
    Metadata
    Show full item record
    Abstract
    Peer-to-Peer (P2P) network is increasingly becoming the most important means of trading content throughout the last years due to the constant evolvement of the cyber world. This popularity made the P2P network susceptible to the spread of malware. The detection of the cause of malware propagation is now critical to the survival of P2P networks. This paper offers a review of the current relevant mathematical propagation models that have been proposed to date to predict the propagation behavior of a malware in a P2P network. We analyzed the models proposed by researchers and experts in the field by evaluating their limitations and a possible alternative for improving the analysis of the expected behavior of a malware spread.
    URI
    http://hdl.handle.net/10454/16651
    Version
    Accepted manuscript
    Citation
    Musa AS, Al-Mohannadi H and Alhamar J (2018) Malware Propagation Modelling in Peer-to-Peer Networks: A Review. The IEEE 6th International Conference on Future Internet of Things and Cloud Workshops, FiCloudW 2018, 6-8 August, Barcelona, Spain.
    Link to publisher’s version
    https://doi.org/10.1109/W-FiCloud.2018.00038
    Type
    Conference paper
    Collections
    Engineering and Digital Technology Publications

    entitlement

     
    DSpace software (copyright © 2002 - 2023)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.