Modeling and Analyzing Passive worms over Unstructured Peer-to-Peer Networks Fangwei Wang1, Yunkai Zhang2, Jianfeng Ma1 (Corresponding author: Fangwei Wang) Ministry of Education Key Lab of Computer Networks and Information Security, Xidian University, Xi’an 710071, China. (Email: [email protected], [email protected]) 1 Network Center, Hebei Normal University, Shijiazhuang 050016, China. ([email protected]) 2 Abstract Passive worm, which is one of the major forms of 1 Introduction peer-to-peer (P2P) worm, have posed serious Unstructured Peer-to-Peer (P2P) overlay networks security threats to the functioning of unstructured are distributed systems in nature, without any P2P networks. A delayed SEIRS epidemic model hierarchical organization or centralized control [1]. with death, offline and online rate is constructed Each peer is a client as well as a server, hereinafter based on the actual situation of P2P users. The basic called a Servent. All peers play the same role in logic reproduction number that governs whether a passive instead of in the function. Unstructured P2P worm is extinct or not is obtained. In this model, time networks provide P2P worms some facilities to delay consists of latent and temporary immunity propagate, although they can decrease reliability and periods. The impact of different parameters on this search capabilities, and increases network traffic. model is studied with simulation results, especially P2P worm is formally proposed in the the effect of time delay, which can provide an International Conference IPTPS 2005 [2] and their important guideline in the control of unstructured tremendous harm to network security have aroused P2P networks as well as passive worm defense. widespread concerns in the community. P2P worms Finally, some future work has been introduced. are malicious codes over a P2P network by Keywords: peer-to-peer networks; passive worms; exploiting vulnerabilities in popular applications and basic reproduction number; equilibrium; protocols. Several reasons make P2P worms propagation model potentially be faster and more furtive than traditional scanning worms. Firstly, the efficiency of locating a avoid some detection methods, such as Virus vulnerable host is high, and they do not waste time Throttle. In this paper, we focus mainly on passive probing host with vulnerabilities. Secondly, the P2P worms. software may contain vulnerabilities which could be Modeling passive worms is useful to understand exploited by attackers. Thirdly, P2P softwares are how particular factors can affect their propagation. It generally not blocked by the firewall because they also helps in studying the effectiveness of some make common outgoing connections to other clients. methods of worm detection and containment, and Once an outgoing connection is made, a server can finding the optimal application of these solutions that pass files to the client. How to effectively defend permits to fight passive worms effectively. Some against P2P worms and decrease the harms caused by epidemiological models have been proposed to study them has been a key problem of domestic and foreign the propagation of scanning strategy-based worms scholars facing. According to the difference of and local subnet scanning worms [4, 5]; however, finding targets and execution, P2P worms can be they can not be used to model passive P2P worms, divided into three categories [3]: passive worm, because of the particular characteristics of passive reactive worm, and proactive worm. Passive worms, P2P worms’ propagation. Therefore, new studies such as Benjamin, Bare, Duload, attach themselves have been carried out to model passive P2P worms’ to shared files and propagate as these files are propagation. In the following, we describe some of downloaded and executed on other hosts; Reactive the proposed models. worms that only propagate with legitimate network The issue of worms in peer-to-peer is addressed activities instead of embedded into sharing files can wherein the authors perform a simulation study of avoid some detection methods available based on dangers posed by P2P worms and proceed to outline abnormal traffic, such as Gnuman worm; and possible mitigation mechanisms [2]. The authors proactive worms automatically connect to and infect point out that P2P worm can stealthily propagate known peers using topological information so that through the overlay topology and invalidate numerous defending mechanisms aiming at scanning model proposed by Cliff C.Z, Hanxun Zhou et al. [9] worms. Moreover, they obtain the upper bound of the take into account the effect of the time delay, and number of infected host. However, Zhou L et al do present a propagation model for passive worms. not take into account the effect of the node position Thommes R et al. [10 use an analytical model to on the worm propagation. Guanling C et al. [3] assess the impact of a detection solution (Credence) provide a workload-driven simulation framework to on the P2P worm propagation, and to determine characterize three types of non-scanning worms and approximately how widespread the Credence system identify their must be so as to combat the worm efficiently. propagations, which states that the type of worm that Richard W.T et al. [11] propose an improved SEI would spread over such a network would not be (Susceptible- Exposed-Infected) model to simulate detected by many of current methods. Andrew K et virus propagation. However, they do not show the al. [6] point out the fact that 68% of the executable length of latency and take into account the impact of files contain passive worms through months of data. anti-virus software. The model (SEIR) proposed by XIA CH et al. [7] present epidemic models of P2P the authors [12] assumes that recovery hosts have a worms in three typical structured P2P networks, permanent immunization period with a certain outline the worms’ rapid spreading capability and probability, which is not consistent with real reveal the negative influences of overlay topologies situation. In order to overcome limitation, Bimal on the worms’ propagation. Krishna R et al. [8] give K.M et al. [13] present a SEIRS model with latent a model for Gnutella-type P2P systems by addressing and temporary immunity periods, which can reveal a parameter (TTL), and consider the possible victims common worm propagation. Due to the fact that it of an infected peer are limited to those which are does not take into account the real situation of TTL hops away from it and not the whole P2P end-users, the model is also not be used to simulate network. The introduction of such a characteristic passive worms over unstructured P2P networks. the parameters influencing would avoid false positives. Based on the two-factor An important omission of work available is the effect of network throughput. Modeling the (1)The total number of peer population N(t) is a propagation of passive worms, the authors assume variable changing with time t. In other words, peers that a vulnerable peer can be infected in a unit time. can join or leave P2P networks. The online rate b and This assumption is certainly not accordant to the offline rate are constants. reality since the average file is 4MB [15], whereas, (2)The total population is partitioned into four average bandwidth per peer is 132KBps [16], which compartments: the susceptible compartment (S), the neglects the diversity of file size in the shared exposed compartment (E), the infected compartment folders. As a result, the downloading time is not a (I), and the recovered compartment (R). Each peer negligible factor, which has a significant effect on can only be in a state, and the infected peer can not be the simulating the passive worms propagation. Thus, infected again. inspired by the reference [13], we propose a new (3)The latency period is a variable related to the delayed SEIRS epidemic mathematically-based downloaded file size; moreover, the immunity period model accounting for the effect of network is a constant related to the anti virus software. throughput based on the actual situation of P2P end users. 2 (4)The waiting time of the exposed, infected and recovered compartment is an exponent distribution. Propagation Model for Passive Worms (5)When a peer is removed from the infected class, it obtains temporary immunity with probability p and 2.1 Model Assumptions died from the attack of passive worms with From the real P2P networks, passive worms must probability (1-p). spend some time on propagating from the infected From the assumptions above, the standard hosts to the susceptible ones due to the effect of incidence of the total variable population size can be current network throughput. We make some expressed as assumptions in order to concisely and accurately reflect the propagation behaviors of passive worms. N(t)=S(t)+E(t)+I(t)+R(t) (1) Table1 lists parameters and notations needed in this paper. Table 1 Parameters and of notations in this paper Parameter S(t) E(t) I(t) R(t) b, μ, ε, α ω,τ γ1 γ2 p TTL bw, s, m Notation Number of susceptible peers at time t Number of exposed peers at time t Number of infected peers at time t Number of recovered peers at time t Per peer online rate, offline rate, death rate, recovery rate, respectively The latency and temporary immunity, respectively Rate at which peers terminate ongoing downloads Rate at which peers renew interest in downloading a file after having deleted it Rate at which a peer generates queries Probability of temporary immunity acquired when a peer is recovered from the infected class Number of hops a query can reach Average bandwidth of all peers, size and the number of chunks of sharing files, respectively discarded. Due to the fact that Gnutella, Kazaa networks follow a power-law degree distribution [14], we use the generating function [14] to quantify the number of peers available while searching for the file. Define the generating function for vertex degree probability distribution as G0 ( x) k 0 p k x k (2) Where p k is the probability that a randomly selected vertex on the network has degree k, which is given by the following equation pk Pr ( N k ) Ck , where C and are constant. The query is used to reach a recursive definition for the k-hop neighbors of a node in the 2.2 Propagation Model for Passive worms network. Because an edge is chosen at random, it is In order to clearly understand the propagation more likely that it leads to a node with a higher process of passive worms, we first study the search degree. The generating function for the probability mechanisms adopted by some P2P networks, such as distribution of reaching a k degree node by traversing Gnutella. Among search mechanisms available, a randomly chosen edge can then be obtained as flooding method is the most popular. Peer A sends out a query for an expected file to all its neighbors. k kpk x k k kpk xG0' ( x) G0' (1) (3) Peer B receiving such a request first check its local The distribution of the outgoing edges from the shared folder, and responds this request if possessing vertex chosen has one power of x lesser then the the file and then check the hop count of the query. If expression (3) and can thus be expressed as the value is greater than zero, it will forward the query to its neighbors; otherwise, the query is G1 ( x) G0' ( x) / G0' (1) . In a similar fashion, the generating function for the number of two-hop Suppose the file has s bits and each peer has a limited neighbors is k p k [G1 ( x)] k G0 (G1 ( x)) . As a result, download capacity, say bw bps. For simplicity, we the recursive formulation for the distribution of the assume that N= Zavk users wish to obtain the expected number of m-hop neighbors is expressed by the file which is initially available at one peer. As a following equation G0(G1(…G1(x)…)), which can be result, we can obtain the following Lemma 1 about given as the average delay for all peers in the whole G ( m) G0 ( x) ( x) ( m1) (G1 ( x)) G m 1 m2 transmitting process. (4) Lemma 1: For the number of peers N, the average Through differentiating the generating function delay for peers is = logZavN at least, where=s/bw. and substituting x=1, we can obtain the average Proof. From above hypothesis, we can obtain that Ns number of one and two hop neighbors of a peer bits are required to be exchanged in order to serve N which are given by Z 1 G0' (1) k kpk and Z 2 G0'' (1) requests. It is clear that a good dissemination strategy respectively. Similarly, the number of m-hop is to first serve Zav users at rate bw, at which point the neighbors can be expressed as Zm=Z1(Z2/Z1)m-1. service capacity grows to bw(Zav+1) bZav, and then Consequently, the average number of search have Zav peers serve remnant peers, until the N users neighborhood of a peer during TTL hop is obtained are served. Under this idealized strategy, peers can as complete service every =s/bw seconds, at which (5) point there are an exponential growth of Zavt/ in the Due to the restriction of network bandwidth, the number of peers available to serve the file. If the time taken a file be simultaneously downloaded by network follows these dynamics the N peers will be multi-peers is different to single peer. Now, we study served by time logZavN+1=k. As a result, the the average time. Let the number of peers in a average download delay experienced by peers can large-scale unstructured P2P network be fixed at N, be computed as follows. Let j denote the delay and a limited number of peers, say 1, can serve them. experienced by the jth peer to complete, and note that Z av i 1 Z i TTL Zav(i-k)N peers complete service at time (i+1), thus, the ith Chunk. Now consider the (k+1)th time slot. an average delay for peers is Suppose the peers in A1 send chunk 1 to the N/Zav 1 N k 1 j 1 j i 0 Z avi k (i 1) k N N 1 N peers that have not yet received it. Meanwhile the peers in Ai (i>1), send Chunk i to a node in A1 (log Z av N 1 N ) log Z av N . N choosing a peer that has at this point only received In some networks (such as eDonkey), multi-part Chunk 1. This process continues until all chunks are downloads strategy is utilized in order to improve the eventually delivered to all peers by time slot downloading speed. Suppose the file is divided into k+m=(/m)(logZav(N-1)+m). Because N/Zav peers have m chunks of identical size. In the following, we study received all chunks when Chunk m-1 completes its average delay for peers under this scenario. duplication across all peers at time slot k+m-1 and Lemma 2: For the number of peers N, the average the rest ones will receive Chunk m during the last delay for peers for downloading a big file (m chunks) time slot k+m, thereafter the average delay is =(/m) logZavN at least, where=s/bw. experienced by peer can be expressed as follows. Proof. When a peer has finished downloading a ( m) file chunk, it can start to server it. To illustrate this idea consider the following idealized strategy. We 1 N m 1 j 1 (jm) 2 (( k m 1) (k m)) m N (log Zav N 2m 1 ) log Zav N . 2 m From Lemma 2, we can obtain that the larger m is, shall track service completions in time slots of size the smaller the average delay for the downloading s/mbw=/m. We suppose that the source of file sends process is. Chunk 1 to a peer, Chunk 2 to another peer, and so on until it finishes disseminating the last Chunk m on slot m. Meanwhile each Chunk i is being duplicated in the network. Then at time k slot, the N peers can be partitioned into k sets Ai, i=1,2,…,k, with | Ai |= Zavk-i, and Ai corresponds to peers which have only received On the other hand, anti virus software can provide a temporary immunity with time instead of permanent immunity. is governed by the version and virus database of anti virus software. The temporary immunity period may get long if the anti virus software is often updating. From the model assumptions in Section 2.1, we can obtain that the number of infected peers at time t is the number of exposed ones ( Z av S (t ) I (t ) N (t ) ) at time t-. Due to the offline of some peers, the Z av S (t ) I (t ) dS (t ) 2 R(t ) I (t )e 1E (t ) dt bN (t ) uS (t ) N ( t ) dE (t ) Z S (t ) I (t ) Z S (t ) I (t )e av av E (t ) 1E (t ) N (t ) N (t ) dt (6) dI (t ) Z av S (t ) I (t )e I (t ) I (t ) I (t ) N (t ) dt dR(t ) pI (t ) I (t )e 2 R(t ) R(t ) dt From Equation (1) and (6), we can get probability of infected peers that are still online is e- from time t- to t. Using the same procedure and assumption, we can obtain that the number of dN(t)/dt=(b-μ)N(t)-(b-(1-p)α)εI(t) For the continuity of the precondition, we require, E (0) peers from the recovered class to the susceptible class isαI(t-), and the probability is e- from time t- to t. 0 Z av S (u ) I (u ) N (u ) eu du R(0) 0 pI (u)e u du 2.3 Model Analysis We do some transforms because of the denominators containing variables. Define As a result, the population transfer among compartments is schematically depicted in the transfer diagram in Figure 1. s(t)=S(t)/N(t), e(t)=E(t)/N(t), i(t)=I(t)/N(t), r(t)=R(t)/N(t), then the Equation (6) can be expressed as Equation (7) t ds(t ) dt b m(t ) s (t ) Z av s (t )i(t ) 2 r (t ) i(t ) exp( t m(q)dq) 1e(t ) de(t ) Z s (t )i(t ) Z s (t )i(t ) exp( t m(q)d q) m(t )e(t ) e(t ) av av 1 t dt t di(t ) Z s (t )i(t ) exp( m(q)d q ) m(t )i(t ) I (t ) I (t ) av dt t dr (t ) t pi(t ) pi(t ) exp( m(q)dq) 2 r (t ) m(t )r (t ) dt t Figure 1 The structure of compartments (7) Where m(t)=b-(b+(1-p))i(t) , and We can obtain the following SEIRS model according to the modeling idea of the epidemic dynamic compartments. 1=s(t)+e(t)+i(t)+r(t). Let S(t), E(t), I(t), R(t) be the solution of Equation (6). The s(t), e(t), i(t), r(t) is the solution of (7) with 0 0 u e(0) Z av s(u)i(u) exp( m(q)dq)du , 0 0 u r (0) pi(u) exp ( m(q)dq)du . If s(t) and i(t) are 3 positive on the initial interval, then s(t) and i(t) are In this section, we provide some examples of passive positive for all finite t 0.(corollary 2.1 [17].) worms behaviors in unstructured P2P network It is easy to Y={(s(t),e(t),i(t),r(t))| check that the region s(t),e(t),i(t),r(t) ≥ 0 and Performance Evaluation and discussions predicted by our model, and study the effect of some parameters. s(t)+e(t)+i(t)+r(t)=1} is a positive invariant set of 3.1 Simulation Model Equation (8). We consider the passive worm free The network used for simulations consists of equilibrium. When the infected fraction i=0, then 30,0000 peers. The network is growing using the e=r=0, and s=1. This is the only equilibrium on the methodology proposed by Holme [18]. This ensures boundary of Y. According to reference [13], we have that the peer degree follows a power law distribution the following threshold for the existence of the and the network has a high clustering coefficient. interior equilibrium: R0=(Zave-)/(b+++1+2). The average peer degree and the exponent of power The threshold R0 is also called the basic reproduction law of the network are 4.5 and 3.4, respectively, number. When R0 is smaller than 1, the equilibrium which are close to the real values of Gnutella is globally stable, and the worm gradually disappears. network as measured in [3,16]. When R0 is larger than 1, the worm will Performance metrics: the system attack quantity performance is defined as follows: the time taken t 1/(b+++1+2) is the average waiting time in the (X axis) to infected peer numbers (Y axis). infective class. For (Zav)<(b+++1+2), the Evaluation systems: a tuple: <TTL, s, m, p, τ> is used solutions of Equation (9) approach the passive worm to represent the configuration parameters. As we free equilibrium as (t) [17]. focus mainly on selected important parameters that exponentially propagate. The are sensitive to the propagation of passive worms, the following parameters are set as constant values (I(0)=1, s=4000KB, bw=132KBps, ε=0.01, b=0.04, μ=0.03, α=0.2, λ=0.001, γ1=0.005, γ2=0.001.) in all observations: the number of hops (TTL) plays an simulations. The size of average files s and average important role in the propagation of passive worm. bandwidth available bw is the same to the real P2P The larger TTL is, the more rapid the passive worm networks. Evaluation method: we use numerical propagates. It is easy to understand that a peer may analysis of the differential equations by using Matlab locate more peers during the search process, and the Simulink to obtain performance data. probability of finding an infected peer becomes The basic reproduction number R0 is 0.4436 larger with the increase of TTL. Thereafter, once a (TTL=2, s=4000KB) through the calculation. The peer is infected, the passive worm will propagate passive worm will gradually disappear from the rapidly. The tendency of the passive worm theory. Next we will validate the conclusion by the propagation in figure 2 is degressive, which is use of some experiments. consistent with the theory analysis. 3.2 Performance Results In this subsection, we report the performance results of propagation model along with observations. Figure 3 Effect of file size Figure 3 shows the data on the performance sensitivity to different file size. The general system is Figure 2 Effect of number of hops configured as <2,*,1,0.4,50> and s ∈ Figure 2 shows the data on the performance {2000,4000,8000}. From figure 3, we make the sensitivity to different TTL. The general system is following observations: the sharing file size s has a configured as <*, 4000, 1, 0.4, 50> and TTL ∈ larger impact on the passive worm. Along with the {1,2,3}. From figure 2, we make the following increase of s, the time of reaching its peak decreases. However, the number of infected peers is obviously users wish to obtain a high-speed and low delay small. As a result, sharing some big files (without communication. However, the early designers do not chunks) as soon as possible is a simple and efficient adequately method. Consequently, the propagation speed of passive consider these security factors. worms is also increased with the increase of the transmission of sharing files. To guarantee a sustained, healthy and stable development of P2P networks, the designers need to take a tradeoff with the efficiency and security. Figure 4 Impact of number of Chunks Figure 4 shows the data on the performance sensitivity to different chunks m. The general system is configured as <2,*,*,0.4,50>, s=80000KB, and m ∈ {1,5,10,20,25}. From figure 4, we make the following observations: although the time of Figure 5 Impact of temporary immunity probability reaching the peak decreases, the peak has no obvious Figure 5 shows the data on the performance change (m=5,10,20,25). Unfortunately, when m=1, sensitivity to temporary immunity probability p. The the passive worm infects much larger peers than general system is configured as <2,4000,1,*,50>, and other values. Under the same assumptions, we can p ∈{0.1,0.5,0.8,0.9}. Figure 5 shows the following draw the conclusions from figure 2-4: a larger TTL, a observations: a large p results in the decrease of smaller sharing file embedded passive worms and a infected peers and much larger time to eradicate larger number of chunks result in the increase of passive worms. This is mainly due to the fact that the propagation number of recovered class becomes large with speed. Under the common circumstances, the designers of P2P networks and increase of p. governed by the number of hops, the size and the number of chunks of sharing files and the temporary immunity period. As a result, in order to effectively defend against passive worms, we must restrict the hops in configuring P2P systems, share large files as Figure 6 Impact of temporary immunity period soon as possible, and update anti virus software in Figure 6 shows the data on the performance time. This can provide an important guideline in the sensitivity to different temporary immunity period τ control of unstructured P2P networks as well as (minute). The general system is configured as passive worm defense. In future work we will <2,4000,1,0.4,*> and τ ∈ {20,50,80,100}. From validate the model with simulations obtained by NS2 figure 4, we make the following observations: the τ (Network simulator); develop a common platform of plays an important role in both the number of simulating passive worms in order to improve the infected peers and propagation speed. The larger τ is, simulating efficiency. the smaller the peak will be. This can win valuable Acknowledgment time to defend against passive worms. For users, the method of improving temporary immunity period is The work is supported by the National Natural to update the anti virus software in time. If all users Science Foundation of China under Grant No. can do this, the damages caused by passive worms 60633020, the Natural Science Foundation of Hebei will minimize. Province of China under Grant No.F2006000177, the Natural the Natural Science Foundation of Hebei 4 Conclusions and Future work This paper proposes a delayed SEIRS model with online rate, offline rate and death rate by the use of the epidemic dynamics. The simulation results show the propagation of passive worms being mainly Education Department of Hebei China under Grant No. 2004445. IEEE Computer and Communications Societies, References [1] Eng KL, Crowcroft J, Marcelo P, Sharma R and Lim S. “A survey and comparison of peer-to-peer overlay network schemes,” Journal of. IEEE Communications Survey and Tutorial, vol. 7, [2] Zhou L, Zhang L, Mcsherry F, Immorlica N and Chien S. “A first look at peer-to-peer worms: threats and defenses,” in Proceedings of Fourth International Workshop on Peer-to-Peer Systems Robert S. G. “Simulating non-scanning worms on peer-to-peer networks,” in Proceedings of malware in peer-to-peer networks,” in Proceedings of the Sixth ACM SIGCOMM on the [7] Xia CH, Shi YP Li XJ. “Research on epidemic models of P2P worm in structured peer-to-peer networks,” Chinese Journal of Computers, vol. 29, no. 6, pp. 952-959, 2006. [8] Krishna R and Biplab S. “Modeling malware (IPTPS'05), pp. 24-35, 2005. C, [6] Andrew K, Abhinav A, Minaxi G. “A study of Internet Measurement, pp. 327-332, 2006. no.4, pp.72-93, 2005. [3] Guanling pp. 1890-1900, 2003. 1st International Conference on Scalable Information Systems, pp.29-42, 2006. [4] Yu W, Cobey B, Sriram C, et al. “Peer-to-peer system-based active worm attacks: modeling and analysis,” in Proceedings of IEEE International Conference on Communications, pp. 295-299, 2005. [5] Zesheng C, Lixin G, and Kwiat.K. “Modeling the spread of active worms,” in Proceeding of Twenty-Second Annual Joint Conference of the propagation in Gnutella type peer-to-peer networks,” in The Third International Workshop on Hot Topics in Peer-to-Peer Systems, pp. 8-15, 2006. [9] Hanxun Zhou, Yingyou Wen, Hong Zhao. “Passive worm propagation modeling and analysis,” in International Multi-Conference on Computing in the Global Information Technology (ICCGI'07), pp. 32-35, 2007. [10] Thommes R. and Coates M. “Epidemiological modeling of peer-to-peer viruses and pollution,” in The Twenty-fifth Annual IEEE Conference on Computer Communications (INFOCOM'06), pp. [16] Krishna P. G, Richard J. D, and Stefan Saroiu, et al. “Measurement, modeling, and analysis of a 15-26, 2006. [11] Richard W.T and Mark J.C. “Modeling virus peer-to-peer file-sharing workload,” in propagation in peer-to-peer networks,” in IEEE Proceedings of the 19th ACM Symposium on International Information, Operating System Principles, pp. 314-329, 2003. Communications & Signal Processing (ICICS [17] K.Cooke, P.Driessche. “Analysis of an SEIRS Conference on 2005), pp. 981-985, 2005. epidemic model with two delays,” Journal of [12] Ping Yan, Shengqiang Liu. “SEIR epidemic model with delay,” Journal of the Australian Mathematical Society, Series B - Applied Mathematics, vol. 48, no.1, pp. 119-134, 2006. [13] Bimal K.M and Dinesh K.S. “SEIRS epidemic model with delay for transmission of malicious objects in computer network,” pp. 1476-1482, 2007. [14] Newman M.E.J, Strogatz S.H and Watts D.J. graphs with arbitrary degree distribution and their applications,” Phys.Rev.E. 64:026118, 2001. [15] Jacky C, Kevin L and Brian N.L. Availability and popularity measurements of peer-to-peer file systems. Technical Report 04-36, 2004. 240-260, 1996. [18] P.Holme, B.J.Kim. “Growing scale-free networks with tunable clustering,” Physical Review E (Statistical Nonlinear, and Soft Matter Physics), vol. 64, no. 2, pp.1-4,2002. Applied Mathematics and Computation, vol. 188, no. 2, “Random Mathematical Biology, vol. 35, no. 2, pp. Fangwei Wang received his B.S degree from College of Mathematics & Information Sciences at Hebei Normal University, Shijiazhuang, China, and the M.Eng. degree in College of Computer Science and Software at Hebei University of Technology, Tianjin, China, in 2000 and 2003, respectively. Since 2006, he has been working toward the Ph.D. degree in School of Computer Science and Technology at the Xidian University, Xi’an, China. He serves as a member of China Computer Federation. His research interests include network and information security, sensor networks. Yunkai Zhang received his B.Eng. degree, M.Eng. degree, Ph.D from Hebei University, Beijing University of Posts and Telecommunications, Xidian University, China respectively. He is currently an professor with the College of Mathematics & Information Sciences, Hebei Normal University. He serves as a member of China Computer Federation. His research interests include network and information security. Jianfeng Ma is vice-dean of School University, doctoral cryptography and a professor and the of Computer in Xidian candidate's advisor of computer application technology, Subject leaders of Computer Science and Technologies, director of Key Lab. of Computer Networks and Information Security. He received his B.S degree from the Department of Mathematics at Shannxi Normal University, Xi’an, China, in 1985. He specialized in Communication and Electronic System, receiving the M.Eng. degree in 1989 and the Ph.D. degree in 1995, all form Xidian University, Xi’an, China. He is a senior member of the Chinese institute of electronics, IEEE member. His current research interests include: theory and technology with system security; existence of information and system; theory and technology of the network security.
© Copyright 2025 Paperzz