• DocumentCode
    493161
  • Title

    Containing Proactive P2P Worm Based on its Multicast Characteristic

  • Author

    Li, Zhitang ; Zhang, Yejiang ; Hu, Zhengbing ; Lin, Huaiqing ; Lu, Chuiwei

  • Author_Institution
    Coll. of Comput. Sci. & Technol., Huazhong Univ. of Sci. & Technol., Wuhan
  • Volume
    1
  • fYear
    2009
  • fDate
    25-26 April 2009
  • Firstpage
    762
  • Lastpage
    765
  • Abstract
    In addition to the real time nature, the neighbor list/routing table of the node in P2P (peer-to-peer) systems presents precise topological information, which makes it possible for proactive P2P worms to propagate over P2P networks rapidly and cause severe damage. However, it is still a challenge to detect their propagation before they plague P2P networks. Based on modeling and analysis of proactive P2P worm propagation and its abnormal multicast traffic pattern, we propose an efficient method for real time worm detection and control against proactive P2P worms according to its multicast characteristic. Simulations on scale-free P2P network topologies have shown promising results of our method.
  • Keywords
    invasive software; multicast communication; peer-to-peer computing; telecommunication network topology; telecommunication traffic; P2P network topologies; multicast characteristic; multicast traffic pattern; peer-to-peer systems; proactive P2P worm; Computer security; Computer worms; Exponential distribution; Gaussian distribution; Joining processes; Network topology; Peer to peer computing; Random variables; Routing; Traffic control; distributed networks; invasive software; security and protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on
  • Conference_Location
    Wuhan, Hubei
  • Print_ISBN
    978-1-4244-4223-2
  • Type

    conf

  • DOI
    10.1109/NSWCTC.2009.357
  • Filename
    4908374