DocumentCode
493161
Title
Containing Proactive P2P Worm Based on its Multicast Characteristic
Author
Li, Zhitang ; Zhang, Yejiang ; Hu, Zhengbing ; Lin, Huaiqing ; Lu, Chuiwei
Author_Institution
Coll. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan
Volume
1
fYear
2009
fDate
25-26 April 2009
Firstpage
762
Lastpage
765
Abstract
In addition to the real time nature, the neighbor list/routing table of the node in P2P (peer-to-peer) systems presents precise topological information, which makes it possible for proactive P2P worms to propagate over P2P networks rapidly and cause severe damage. However, it is still a challenge to detect their propagation before they plague P2P networks. Based on modeling and analysis of proactive P2P worm propagation and its abnormal multicast traffic pattern, we propose an efficient method for real time worm detection and control against proactive P2P worms according to its multicast characteristic. Simulations on scale-free P2P network topologies have shown promising results of our method.
Keywords
invasive software; multicast communication; peer-to-peer computing; telecommunication network topology; telecommunication traffic; P2P network topologies; multicast characteristic; multicast traffic pattern; peer-to-peer systems; proactive P2P worm; Computer security; Computer worms; Exponential distribution; Gaussian distribution; Joining processes; Network topology; Peer to peer computing; Random variables; Routing; Traffic control; distributed networks; invasive software; security and protection;
fLanguage
English
Publisher
ieee
Conference_Titel
Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
Conference_Location
Wuhan, Hubei
Print_ISBN
978-1-4244-4223-2
Type
conf
DOI
10.1109/NSWCTC.2009.357
Filename
4908374
Link To Document