Research on Intrusion and Defense of P2P-Based Worm

被引:0
|
作者
Lu Chuiwei [1 ]
机构
[1] Huangshi Inst Technol, Comp Sch, Huangshi, Peoples R China
来源
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II | 2009年
关键词
P2P; Worm; Intrusion; Network security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
P2P worm is virus that propagate rely on P2P network. Worm can achieve the information of the neighbor nodes easily through the routing table of infected nodes. Therefore, the propagation of P2P worm is faster than in other network. P2P worm will cause serious network congestion and revelation of private information. The paper proposes a distributed detection and defense strategy for P2P worm based on hiberarchy, and makes quantitative analysis for the propagation and attack process of the P2P worm. The simulation experiments demonstrate: the strategy has a satisfactory effect on suppressing and eliminating P2P worm.
引用
收藏
页码:540 / 543
页数:4
相关论文
共 50 条
  • [1] RESEARCH OF THE P2P WORM DEFENSE MECHANISM BASED ON TRUST MECHANISM
    Xiong, Hao
    Wang, Zhihong
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 158 - 161
  • [2] The Effect of P2P-Based Worm Propagation in an IPv6 Internet
    Yang, Wei
    Li, Cheng-dong
    Chang, Gui-ran
    Yao, Yu
    Shen, Xiao-meng
    CEIS 2011, 2011, 15
  • [3] P2P worm Propagation modeling and analysis under dynamic quarantine defense
    Yang, Wei
    Li, Yong
    Chang, Gui-ran
    Yao, Yu
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 60 - 63
  • [4] Request diversion: a novel mechanism to counter P2P-based DDoS attacks
    Al-Duwairi, Basheer
    Mustafa, Abdul-Raheem Masoud
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2010, 5 (1-2) : 55 - 64
  • [5] Wind Talker: A P2P-Based Low-Latency Anonymous Communication Network
    Zhang, Jia
    Duan, Haixin
    Liu, Wu
    Wu, Jianping
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (10) : 3183 - 3194
  • [7] Research of Worm Intrusion Detection Algorithm Based on Statistical Classification Technolog
    Xue, Li
    Hu, Zhihui
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 413 - 416
  • [8] A random and scale-free hybrid P2P worm propagation model
    Chen J.-H.
    Hu C.-Z.
    Shi F.
    Wei S.-J.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2010, 38 (05): : 80 - 85
  • [10] Detection and Defense of Identity Attacks in P2P Network
    Lu, Chuiwei
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2009, 5821 : 500 - 507