Research on Intrusion and Defense of P2P-Based Worm

被引:0
|
作者
Lu Chuiwei [1 ]
机构
[1] Huangshi Inst Technol, Comp Sch, Huangshi, Peoples R China
来源
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II | 2009年
关键词
P2P; Worm; Intrusion; Network security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
P2P worm is virus that propagate rely on P2P network. Worm can achieve the information of the neighbor nodes easily through the routing table of infected nodes. Therefore, the propagation of P2P worm is faster than in other network. P2P worm will cause serious network congestion and revelation of private information. The paper proposes a distributed detection and defense strategy for P2P worm based on hiberarchy, and makes quantitative analysis for the propagation and attack process of the P2P worm. The simulation experiments demonstrate: the strategy has a satisfactory effect on suppressing and eliminating P2P worm.
引用
收藏
页码:540 / 543
页数:4
相关论文
共 50 条
  • [21] Research on Network Security Intrusion Identification and Defense Against Malicious Network Damage in a Cloud Environment
    Zhang, Yong
    International Journal of Network Security, 2022, 24 (03) : 551 - 556
  • [22] Research of Intrusion Detection based on Principal Components Analysis
    Chen Bo
    Ma Wu
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 1, PROCEEDINGS, 2009, : 116 - 119
  • [24] TrustP2PNet: P2P Social Network with Admission Control Model based on Trust
    Liu, Wu
    Ren, Ping
    Sun, Donghong
    Liu, Ke
    Wu, Jianping
    2013 AASRI CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND SYSTEMS, 2013, 5 : 281 - 286
  • [25] P2P networking based internet of things (IoT) sensor node authentication by Blockchain
    Sunghyuck Hong
    Peer-to-Peer Networking and Applications, 2020, 13 : 579 - 589
  • [26] Worm detection research based on biological immune principle and FCM algorithm
    Liu, Guozhu
    Kang, Huimin
    Qi, Huaxin
    INFORMATION TECHNOLOGY AND COMPUTER APPLICATION ENGINEERING, 2014, : 29 - 32
  • [27] P2P networking based internet of things (IoT) sensor node authentication by Blockchain
    Hong, Sunghyuck
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (02) : 579 - 589
  • [28] Experiments with P2P Botnet Detection
    Riviere, Lionel
    Dietrich, Sven
    IT-INFORMATION TECHNOLOGY, 2012, 54 (02): : 90 - 95
  • [29] Study on Trust Model in P2P
    Gan Zhi-gang
    INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 295 - 301
  • [30] Research on Distributed Intrusion Detection System Based on Mobile Agent
    Hou, Zhisong.
    Yu, Zhou.
    Zheng, Wei.
    Zuo, Xiangang.
    JOURNAL OF COMPUTERS, 2012, 7 (08) : 1919 - 1926