Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme

被引:0
|
作者
Cai, Lin [1 ]
Rojas-Cessa, Roberto [1 ]
机构
[1] New Jersey Inst Technol, Networking Res Lab, Dept Elect & Comp Engn, Newark, NJ 07102 USA
来源
2009 IEEE SARNOFF SYMPOSIUM, CONFERENCE PROCEEDINGS | 2009年
关键词
Malware; P2P; peer-to-peer networks; trust management; virus proliferation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) networking is used by users with similar interests to exchange, contribute, or obtain files. This network model has been proven popular to exchange music, pictures, or software applications that are saved, and most likely executed at the downloading host. At the expense of this mechanism, worms, viruses, and intruding files find an open front door to the downloading host and giving them place to a very convenient environment for successful proliferation throughout the network. Although virus detection software are currently available, this countermeasure works in a reactive approach and most times isolated manner. In this paper, we consider a trust management scheme to contain the proliferation of viruses in P2P networks. Specifically, we propose a trust management system based on a two-layer approach to bound the proliferation of viruses. The new scheme is called Double-layer Dynamic Trust (DDT) management scheme. Our results show the proposed scheme bounds virus proliferation. With this approach, the number of infected hosts and proliferation rate are limited to small values. We compare our results to other existing approaches.
引用
收藏
页码:198 / 202
页数:5
相关论文
共 43 条
  • [21] The application of collaborative filtering for trust management in P2P communities
    Zuo, M
    Wang, K
    Li, JH
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 383 - 394
  • [22] An abstract model for incentive-enhanced trust in P2P networks
    Neovius, M
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 602 - 611
  • [23] SPTM: A Security Protocol for Protecting the P2P Trust Information Management
    Hu, Jianli
    Wu, Quanyuan
    Zhou, Bin
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 56 - 60
  • [24] Robust and Effective Feedback Confidence Based P2P Trust Management
    Hu, Jianli
    Li, Xiaohua
    Zhou, Bin
    Li, Yonghua
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 172 - 176
  • [25] A secure P2P file sharing model using trust management and data integrity verification
    Senthil Madasamy N.
    Revathi T.
    Senthil Madasamy, N. (senthilmadasamy90@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 335 - 344
  • [26] Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions
    Sanchez-Patino, Natalia
    Gallegos-Garcia, Gina
    Rivero-Angeles, Mario E.
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [27] SAP2P: A P2P network security architecture based on trust management system
    Zhang, DH
    Zhang, YQ
    Zhou, YY
    PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 849 - 855
  • [28] The Research on the P2P Trust Management Model under Electronic Commerce Environment
    Wang, Yajing
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 2373 - 2375
  • [29] A fair micro-payment scheme for profit sharing in P2P networks
    Catalano, D
    Ruffo, G
    2004 INTERNATIONAL WORKSHOP ON HOT TOPICS IN PEER-TO-PEER SYSTEMS, PROCEEDINGS, 2004, : 32 - 39
  • [30] Time self-decay trust management algorithm for P2P computing security
    National Engineering Center for Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2007, 1 (1-10): : 1 - 10