Ayuda
Ir al contenido

Dialnet


Proactive P2P worm containment via automatic authentication

    1. [1] University of Electronic Science and Technology of China

      University of Electronic Science and Technology of China

      China

    2. [2] Unit 78046 of People’s Liberation Army
  • Localización: Compel: International journal for computation and mathematics in electrical and electronic engineering, ISSN 0332-1649, Vol. 32, Nº 2 (Special Issue: CAC 2010), 2013, págs. 661-673
  • Idioma: inglés
  • Enlaces
  • Resumen
    • urpose – Nowadays, proactive P2P worm (PRWORM) poses a latent threat to internet infrastructure and common users for the fatal vulnerabilities in homogeneous P2P software. It is more difficult to contain PRWORM because of its fast spread speed. Current techniques are not adequate to quarantine PRWORM, mainly because of their inaccuracy and slow response to attacks. The purpose of this paper is to propose an accurate and real‐time approach for PRWORM containment.

      Design/methodology/approach – First, the authors present a new methodology to contain PRWORM via proper authentication of initiators of P2P communications. Second, three simple network protocols are proposed to fulfill automatic authentication.

      Findings – Both simulations and strictly mathematical proof by Strand Space Model represent that the authors' work is able to accurately quarantine PRWORM in real time. Furthermore, proof shows the three network protocols are resistant to popular attacks such as man‐in‐the‐middle attack and replay attack.

      Originality/value – First, the authors propose an authentication based method to contain proactive P2P worm and second, use strand space model to proof the effectiveness and security of the method.


Fundación Dialnet

Dialnet Plus

  • Más información sobre Dialnet Plus

Opciones de compartir

Opciones de entorno