Security applications of peer-to-peer networks

被引:19
作者
Vlachos, V [1 ]
Androutsellis-Theotokis, S [1 ]
Spinellis, D [1 ]
机构
[1] Univ Athens, Dept Management Sci & Technol, GR-10434 Athens, Greece
关键词
peer-to-peer; anti-virus; intrusion detection; JXTA;
D O I
10.1016/j.comnet.2004.01.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propose the use of a peer-to-peer architecture whereby each peer is responsible for: (a) detecting whether a virus or worm is uncontrollably propagating through the network resulting in an epidemic; (b) automatically dispatching warnings and information to other peers of a security-focused group; and (c) taking specific precautions for protecting their host by automatically hardening their security measures during the epidemic. This can lead to auto-adaptive secure operating systems that automatically change the trust level of the services they provide. We demonstrate our approach through a prototype application based on the J(XTA) peer-to-peer infrastructure. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:195 / 205
页数:11
相关论文
共 42 条
[21]  
SERJANTOV A, 2002, P 1 INT WORKSH PEER
[22]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[23]   Intrusion detection using autonomous agents [J].
Spafford, EH ;
Zamboni, D .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04) :547-570
[24]   Reliable identification of bounded-length viruses is NP-complete [J].
Spinellis, D .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (01) :280-284
[25]  
Spinellis DD, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE 2000 USENIX ANNUAL TECHNICAL CONFERENCE, P149
[26]  
STANIFORD S, 2002, P 11 USENIX SEC S
[27]  
Staniford-Chen S., 1996, P 19 NAT INF SYST SE, V1
[28]  
VERT G, 1998, P 21 NAT INF SYST SE, P329
[29]   On computer viral infection and the effect of immunization [J].
Wang, CX ;
Knight, JC ;
Elder, MC .
16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, :246-256
[30]  
Wilson B.J, 2002, JXTA