Worm detection system based on P2P networks

被引:0
|
作者
Tang, Haokun [1 ]
Liu, Yanbing [2 ]
Huang, Jun [2 ]
Xiao, Yunpeng [3 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
[2] School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
[3] School of Software, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
关键词
Distributed computer systems - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Because traditional detection methods of Internet worms were not accustomed to the worm defense in P2P networks, this paper constructed a worm detection system based on P2P networks after well researching the technology of worm detection and drawing lessons from the existing advanced algorithms on worm detection, combining the propagation feature of P2P worms. The system can realize rapid detection, multiple defense, in time predict for P2P worms and tries to lower the false positive and false negative rate from three levels and multiple aspects, which is helpful to defense against worms in P2P networks.
引用
收藏
页码:230 / 235
相关论文
共 50 条
  • [1] PROACTIVE WORM PREVENTION BASED ON P2P NETWORKS
    Wu, Kai-Gui
    Feng, Yong
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 205 - 210
  • [2] P2P worm detection based on application identification
    Xia C.
    Shi Y.
    Li X.
    Gao W.
    [J]. Front. Comput. Sci. China, 2007, 1 (114-122): : 114 - 122
  • [3] A DISTRIBUTED FRAMEWORK FOR PASSIVE WORM DETECTION AND THROTTLING IN P2P NETWORKS
    Adeel, Muhammad
    Tokarchuk, Laurissa
    Cuthbert, Laurie
    Feng, Chao-Sheng
    Qin, Zhi-guang
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1247 - +
  • [4] A Game Based Passive Worm Defense Model for P2P Networks
    Tang, Haokun
    Huang, Jun
    Wang, Wei
    [J]. APPLIED COMPUTING REVIEW, 2014, 14 (01): : 20 - 29
  • [5] A Signature-behavior-based P2P worm detection approach
    Yao, Yu
    Li, Yong
    Gao, Fu-xiang
    Yu, Ge
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 391 - +
  • [6] P2P worm detection based on traffic classification and application identification
    Key Laboratory of Beijing Network Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    [J]. Beijing Hangkong Hangtian Daxue Xuebao, 2006, 8 (998-1002):
  • [7] Breaking monocultures in P2P networks for worm prevention
    Zhou, Ying
    Wu, Zhong-Fu
    Wang, Hao
    Zhong, Jiang
    Feng, Yong
    Zhu, Zheng-Zhou
    [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2793 - +
  • [8] Modeling Propagation of REACTIVE WORM in P2P Networks
    Qin, Zhi-guang
    Feng, Chao-sheng
    Zhang, Feng-li
    CuthbeRt, Laurence
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II: COMMUNICATIONS, NETWORKS AND SIGNAL PROCESSING, VOL I/ELECTRONIC DEVICES, CIRUITS AND SYSTEMS, VOL II, 2009, : 335 - +
  • [9] Analyze the worm-based attack in large scale P2P networks
    Yu, W
    [J]. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 308 - 309
  • [10] Hybrid Trust Model for Worm Mitigation in P2P Networks
    Amine Rguibi, Mohamed
    Moussa, Najem
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 21 - 36