DocumentCode :
493161
Title :
Containing Proactive P2P Worm Based on its Multicast Characteristic
Author :
Li, Zhitang ; Zhang, Yejiang ; Hu, Zhengbing ; Lin, Huaiqing ; Lu, Chuiwei
Author_Institution :
Coll. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan
Volume :
1
fYear :
2009
fDate :
25-26 April 2009
Firstpage :
762
Lastpage :
765
Abstract :
In addition to the real time nature, the neighbor list/routing table of the node in P2P (peer-to-peer) systems presents precise topological information, which makes it possible for proactive P2P worms to propagate over P2P networks rapidly and cause severe damage. However, it is still a challenge to detect their propagation before they plague P2P networks. Based on modeling and analysis of proactive P2P worm propagation and its abnormal multicast traffic pattern, we propose an efficient method for real time worm detection and control against proactive P2P worms according to its multicast characteristic. Simulations on scale-free P2P network topologies have shown promising results of our method.
Keywords :
invasive software; multicast communication; peer-to-peer computing; telecommunication network topology; telecommunication traffic; P2P network topologies; multicast characteristic; multicast traffic pattern; peer-to-peer systems; proactive P2P worm; Computer security; Computer worms; Exponential distribution; Gaussian distribution; Joining processes; Network topology; Peer to peer computing; Random variables; Routing; Traffic control; distributed networks; invasive software; security and protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-1-4244-4223-2
Type :
conf
DOI :
10.1109/NSWCTC.2009.357
Filename :
4908374
Link To Document :
بازگشت