Research on Intrusion and Defense of P2P-Based Worm

被引:0
作者
Lu Chuiwei [1 ]
机构
[1] Huangshi Inst Technol, Comp Sch, Huangshi, Peoples R China
来源
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II | 2009年
关键词
P2P; Worm; Intrusion; Network security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
P2P worm is virus that propagate rely on P2P network. Worm can achieve the information of the neighbor nodes easily through the routing table of infected nodes. Therefore, the propagation of P2P worm is faster than in other network. P2P worm will cause serious network congestion and revelation of private information. The paper proposes a distributed detection and defense strategy for P2P worm based on hiberarchy, and makes quantitative analysis for the propagation and attack process of the P2P worm. The simulation experiments demonstrate: the strategy has a satisfactory effect on suppressing and eliminating P2P worm.
引用
收藏
页码:540 / 543
页数:4
相关论文
共 50 条
  • [41] Research on Algorithm Based on Secure Computer Network Defense
    Tian Jifeng
    [J]. PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 1462 - 1468
  • [42] Honeypot-based Defense System Research and Design
    Zhang Li-juan
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 466 - 470
  • [43] Decentralized detection of network attacks through P2P data clustering of SNMP data
    Cerroni, Walter
    Moro, Gianluca
    Pasolini, Roberto
    Ramilli, Marco
    [J]. COMPUTERS & SECURITY, 2015, 52 : 1 - 16
  • [44] A Comprehensive Study of the Bitcoin P2P Network
    Eisenbarth, Jean-Philippe
    Cholez, Thibault
    Perrin, Olivier
    [J]. 2021 3RD CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2021, : 105 - 112
  • [45] Authentication and access control in P2P network
    Zhang, YQ
    Zhang, DH
    [J]. GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 468 - 470
  • [46] Model the P2P Attack in Computer Networks
    Wang, Wei
    Zhao, Wenhong
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE (LEMCS 2015), 2015, 117 : 1303 - 1307
  • [47] Intrusion Detection Method based on Improved BP Neural Network Research
    Zhu YuanZhong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 193 - 202
  • [48] Research and Implementation of Intrusion Detection System Based on Artificial Neural Network
    Han Xiaocui
    [J]. MATERIALS AND MANUFACTURING TECHNOLOGY, PTS 1 AND 2, 2010, 129-131 : 1421 - 1425
  • [49] Research and Implementation of Intrusion Detection Algorithm Based on BP Neural Network
    Wu, Zhenzhen
    [J]. PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 228 - 232
  • [50] A Certificate less-Based Key Distribution Scheme with Multi-KGCs In P2P Networks
    Liang, Chen
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4424 - 4427