Research on Intrusion and Defense of P2P-Based Worm

被引:0
|
作者
Lu Chuiwei [1 ]
机构
[1] Huangshi Inst Technol, Comp Sch, Huangshi, Peoples R China
关键词
P2P; Worm; Intrusion; Network security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
P2P worm is virus that propagate rely on P2P network. Worm can achieve the information of the neighbor nodes easily through the routing table of infected nodes. Therefore, the propagation of P2P worm is faster than in other network. P2P worm will cause serious network congestion and revelation of private information. The paper proposes a distributed detection and defense strategy for P2P worm based on hiberarchy, and makes quantitative analysis for the propagation and attack process of the P2P worm. The simulation experiments demonstrate: the strategy has a satisfactory effect on suppressing and eliminating P2P worm.
引用
收藏
页码:540 / 543
页数:4
相关论文
共 50 条
  • [1] A WAW model of P2P-based anti-worm
    Yao, Yu
    Wu, Liqiong
    Gao, Fuxiang
    Yang, Wei
    Yu, Ge
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1131 - 1136
  • [2] Research of P2P-based route technology
    School of Computer Engineering and Sciences, Shanghai University, Shanghai 200072, China
    Jisuanji Gongcheng, 2006, 6 (134-136):
  • [3] RESEARCH OF THE P2P WORM DEFENSE MECHANISM BASED ON TRUST MECHANISM
    Xiong, Hao
    Wang, Zhihong
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 158 - 161
  • [4] A trust-aware, P2P-based overlay for intrusion detection
    Duma, Claudiu
    Karresand, Martin
    Shahmehri, Nahid
    Caronni, Germano
    SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, : 692 - +
  • [5] The Effect of P2P-Based Worm Propagation in an IPv6 Internet
    Yang, Wei
    Li, Cheng-dong
    Chang, Gui-ran
    Yao, Yu
    Shen, Xiao-meng
    CEIS 2011, 2011, 15
  • [6] On the Effectiveness of Structural Detection and Defense Against P2P-based Botnets
    Ha, Duc T.
    Yan, Guanhua
    Eidenbenz, Stephan
    Ngo, Hung Q.
    2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, : 297 - +
  • [7] Research on the Clustering and Composition of P2P-based Web Services
    Wang Lei
    Si Jing
    Hu Xiao-bo
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 2007 - 2011
  • [8] Research on fault tolerance in hybrid P2P-based collaborative systems
    Fu, Hao
    Cai, Ming
    Zhu, Wenmin
    Huang, Zhongdong
    Dong, Jinxiang
    PROCEEDINGS OF THE 2007 11TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2007, : 30 - +
  • [9] PCSCW: P2P-based computer supported cooperative work research
    Xia, H
    Wu, QD
    Zhang, H
    Lu, JF
    Xing, DS
    PROCEEDINGS OF THE 4TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-4, 2002, : 2770 - 2774
  • [10] Research on worm's propagation and defense model in different P2P networks
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2006, SUPPL. 2 (49-53):