{"id":"https://openalex.org/W2160280047","doi":"https://doi.org/10.1109/ipdps.2009.5161239","title":"Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks","display_name":"Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks","publication_year":2009,"publication_date":"2009-05-01","ids":{"openalex":"https://openalex.org/W2160280047","doi":"https://doi.org/10.1109/ipdps.2009.5161239","mag":"2160280047"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipdps.2009.5161239","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102196579","display_name":"Jiaqing Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"funder","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Jiaqing Luo","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365935","display_name":"Bin Xiao","orcid":"https://orcid.org/0000-0003-4223-8220"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"funder","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Bin Xiao","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100626698","display_name":"Guobin Liu","orcid":"https://orcid.org/0009-0004-2563-8606"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"funder","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Guobin Liu","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057569553","display_name":"Qingjun Xiao","orcid":"https://orcid.org/0000-0001-5353-9374"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"funder","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Qingjun Xiao","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012385922","display_name":"Shijie Zhou","orcid":"https://orcid.org/0000-0001-8314-754X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"funder","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shijie Zhou","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.727,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":13,"citation_normalized_percentile":{"value":0.667904,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bittorrent","display_name":"BitTorrent","score":0.63694215},{"id":"https://openalex.org/keywords/bittorrent-tracker","display_name":"BitTorrent tracker","score":0.60930145}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7819825},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7072989},{"id":"https://openalex.org/C520566109","wikidata":"https://www.wikidata.org/wiki/Q133862","display_name":"BitTorrent","level":3,"score":0.63694215},{"id":"https://openalex.org/C57501372","wikidata":"https://www.wikidata.org/wiki/Q2021268","display_name":"BitTorrent tracker","level":3,"score":0.60930145},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.55520606},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5204675},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.50364417},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.49627215},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41019735},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.2542339},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19591793},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14647514},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C56461940","wikidata":"https://www.wikidata.org/wiki/Q970687","display_name":"Eye tracking","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipdps.2009.5161239","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.69,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1556925457","https://openalex.org/W2055785904","https://openalex.org/W2125672877","https://openalex.org/W2133145073","https://openalex.org/W2145580295","https://openalex.org/W2160581357","https://openalex.org/W2163857670","https://openalex.org/W2166245380","https://openalex.org/W2406324984","https://openalex.org/W2545729344","https://openalex.org/W3144397788"],"related_works":["https://openalex.org/W2380981030","https://openalex.org/W2217575862","https://openalex.org/W2135424926","https://openalex.org/W2101961340","https://openalex.org/W2032430856","https://openalex.org/W2030240214","https://openalex.org/W2016364414","https://openalex.org/W1970750776","https://openalex.org/W1598962800","https://openalex.org/W1589734883"],"abstract_inverted_index":{"Worm":[0],"propagation":[1,8,34,74,119,125],"analysis,":[2],"including":[3],"exploring":[4],"mechanisms":[5],"of":[6,12,120,134,153,165,176,183],"worm":[7,19,33,73,107,136,144,167,185],"and":[9,21,89,126,179],"formulating":[10],"effects":[11],"network/worm":[13],"parameters,":[14],"has":[15],"great":[16],"importance":[17],"for":[18,72],"containment":[20],"host":[22],"protection":[23],"in":[24,75,156],"P2P":[25,77,158],"networks.":[26,78],"Previous":[27],"work":[28],"only":[29],"focuses":[30],"on":[31],"topological":[32,191],"where":[35],"worms":[36],"search":[37],"a":[38,69,94,98,104,122,150,157],"hosts":[39],"neighbor-list":[40],"to":[41,60,96,108,116,145],"find":[42],"new":[43,70,87],"victims.":[44],"In":[45,64],"BitTorrent":[46],"(BT)":[47],"networks,":[48],"the":[49,118,135,143,163,174,181,184,190],"information":[50],"from":[51],"servers":[52],"or":[53],"trackers,":[54],"however,":[55],"could":[56],"be":[57,109],"fully":[58],"exploited":[59],"design":[61,137],"effective":[62],"worms.":[63],"this":[65],"paper,":[66],"we":[67],"propose":[68],"approach":[71],"BT-like":[76],"The":[79,129,170],"worm,":[80,85],"called":[81],"Dynamic":[82],"Hit-List":[83],"(DHL)":[84],"locates":[86],"victims":[88],"propagates":[90],"itself":[91,147],"by":[92,186],"requesting":[93],"tracker":[95],"build":[97],"dynamic":[99],"hit":[100],"list,":[101],"which":[102],"is":[103],"self-stopping":[105],"BT":[106],"stealthy.":[110],"We":[111,160],"construct":[112],"an":[113],"analytical":[114,130],"model":[115,178],"study":[117],"such":[121],"worm:":[123],"breadth-first":[124],"depth-first":[127],"propagation.":[128],"results":[131,172],"provide":[132],"insights":[133],"into":[138],"choosing":[139],"parameters":[140],"that":[141],"enable":[142],"stop":[146],"after":[148],"compromising":[149],"large":[151],"fraction":[152],"vulnerable":[154],"peers":[155],"network.":[159],"finally":[161],"evaluate":[162],"performance":[164],"DHL":[166],"through":[168],"simulations.":[169],"simulation":[171],"verify":[173],"correctness":[175],"our":[177],"show":[180],"effectiveness":[182],"comparing":[187],"it":[188],"with":[189],"worm.":[192]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2160280047","counts_by_year":[{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":5}],"updated_date":"2025-04-16T02:30:05.186817","created_date":"2016-06-24"}