On defending peer-to-peer system-based active worm attacks

@article{Yu2005OnDP,
  title={On defending peer-to-peer system-based active worm attacks},
  author={Wei Yu and Sriram Chellappan and Xun Wang and Dong Xuan},
  journal={GLOBECOM '05. IEEE Global Telecommunications Conference, 2005.},
  year={2005},
  volume={3},
  pages={5 pp.-}
}
Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. Our previous results show that P2P systems with large number of hosts can be a potential vehicle for the active worm attacker to achieve fast worm propagation in the Internet. In this paper, we propose a region-based active immunization defense strategy in P2P systems to fight against P2P-based active worm attacks. We develop an analytical… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
Showing 1-10 of 10 extracted citations

Propagation modeling of active P2P worms based on ternary matrix

J. Network and Computer Applications • 2013
View 5 Excerpts
Highly Influenced

An analysis of propagation and capability to attack of active P2P worms

2010 3rd International Conference on Computer Science and Information Technology • 2010

Passive Worm and Malware Detection in Peer-to-Peer Networks

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing • 2010
View 1 Excerpt

An Exact Model for Active P2P Worms Propagation

2009 Fourth International Conference on Frontier of Computer Science and Technology • 2009
View 1 Excerpt

A P2P E-commerce Related Network Security Issue: P2P Worm

2008 International Symposium on Electronic Commerce and Security • 2008
View 2 Excerpts

Evolutionary Proactive P2P Worm: Propagation Modeling and Simulation

2008 Second International Conference on Genetic and Evolutionary Computing • 2008
View 1 Excerpt

OnRipple: A Distributed Overlay Framework for Targeted Immunization in Large-Scale Networks

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007) • 2007
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 15 references

Peer-to-peer system-based active worm attacks: modeling and analysis

IEEE International Conference on Communications, 2005. ICC 2005. 2005 • 2005
View 6 Excerpts

Blaster variant offers 'fix' for pox-ridden Pcs

J. Leyden
http:// www. theregister.com/ • 2003
View 1 Excerpt

Containment of Scanning Worms in Enterprise Network

S. Staniford
Journal of Computer Security • 2003
View 1 Excerpt

Inside the Slammer Worm

IEEE Security & Privacy • 2003
View 2 Excerpts

Code red worm propagation modeling and analysis

ACM Conference on Computer and Communications Security • 2002

Similar Papers

Loading similar papers…