Research on Intrusion and Defense of P2P-Based Worm

被引:0
作者
Lu Chuiwei [1 ]
机构
[1] Huangshi Inst Technol, Comp Sch, Huangshi, Peoples R China
来源
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II | 2009年
关键词
P2P; Worm; Intrusion; Network security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
P2P worm is virus that propagate rely on P2P network. Worm can achieve the information of the neighbor nodes easily through the routing table of infected nodes. Therefore, the propagation of P2P worm is faster than in other network. P2P worm will cause serious network congestion and revelation of private information. The paper proposes a distributed detection and defense strategy for P2P worm based on hiberarchy, and makes quantitative analysis for the propagation and attack process of the P2P worm. The simulation experiments demonstrate: the strategy has a satisfactory effect on suppressing and eliminating P2P worm.
引用
收藏
页码:540 / 543
页数:4
相关论文
共 50 条
  • [31] Research on Immune based Adaptive Intrusion Detection System Model
    Deng, Lei
    Gao, De-yuan
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 488 - 491
  • [32] Research on Intrusion Detection Method Based on Improved Smote and XGBoost
    Su, Peihuang
    Liu, Yanhua
    Song, Xiang
    ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 37 - 41
  • [33] Research on distributed intrusion detection system based on mobile agent
    Cao, Jin-Gang
    Zheng, Gu-Ping
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1394 - 1399
  • [34] Research on Distributed Intrusion Detection Model Based on Information Fusion
    Ping, Du
    Wei, Xu
    NANOTECHNOLOGY AND COMPUTER ENGINEERING, 2010, 121-122 : 528 - 533
  • [35] Research On SVM Detection Of Network Intrusion Based On Vulnerability Scanning
    Yang, Jie
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2008, : 1286 - 1291
  • [36] Research on Dynamic Intrusion Detection Model Based on Risk Coefficient
    Wei Zheng
    Hou Jun-yi
    Tan Hua
    Guo Guang-nan
    MATERIALS AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2010, 129-131 : 124 - +
  • [37] Research on the data-mining-based intrusion detection technology
    Li, Guobin
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1, 2008, : 515 - 518
  • [38] Study on Trust Model in P2P
    Gan Zhi-gang
    INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 295 - 301
  • [39] Experiments with P2P Botnet Detection
    Riviere, Lionel
    Dietrich, Sven
    IT-INFORMATION TECHNOLOGY, 2012, 54 (02): : 90 - 95
  • [40] Network Security Technology in P2P
    Zhang, Pengwei
    Jiao, Xiaojing
    Zhou, Ruijin
    ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 145 - 149