Security applications of peer-to-peer networks

被引:19
作者
Vlachos, V [1 ]
Androutsellis-Theotokis, S [1 ]
Spinellis, D [1 ]
机构
[1] Univ Athens, Dept Management Sci & Technol, GR-10434 Athens, Greece
关键词
peer-to-peer; anti-virus; intrusion detection; JXTA;
D O I
10.1016/j.comnet.2004.01.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propose the use of a peer-to-peer architecture whereby each peer is responsible for: (a) detecting whether a virus or worm is uncontrollably propagating through the network resulting in an epidemic; (b) automatically dispatching warnings and information to other peers of a security-focused group; and (c) taking specific precautions for protecting their host by automatically hardening their security measures during the epidemic. This can lead to auto-adaptive secure operating systems that automatically change the trust level of the services they provide. We demonstrate our approach through a prototype application based on the J(XTA) peer-to-peer infrastructure. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:195 / 205
页数:11
相关论文
共 42 条
[1]  
[Anonymous], 1991, P 14 NAT COMP SEC C
[2]  
BAKOS G, 2002, P SPIE AEROSENCE
[3]  
CHEN R, POBLANO DISTRIBUTED
[4]  
DRUSCHEL P, 2001, P 8 WORKSH HOT TOP O
[5]  
ERBACHER R, 2002, IEEE COMPUTER GRAPHI, V22
[6]   Computer immunology [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A .
COMMUNICATIONS OF THE ACM, 1997, 40 (10) :88-96
[7]  
Frincke D., 1998, P 21 NIST NCSC NAT I, P361
[8]  
HAND S, 2002, P 1 INT WORKSH PEER
[9]  
JANAKIRAMAN R, 2003, P 2003 IEEE WET ICE
[10]  
KEPHART J, 1992, P ARTIFICAL LIFE, V3