Abstract | ||
---|---|---|
Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strategy than random scanning for locating victims. This paper describes the danger posed by P2P worms and initiates the study of possible mitigation mechanisms. In particular, the paper explores the feasibility of a self-defense infrastructure inside a P2P network, outlines the challenges, evaluates how well this defense mechanism contains P2P worms, and reveals correlations between containment and the overlay topology of a P2P network. Our experiments suggest a number of design directions to improve the resilience of P2P networks to worm attacks. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1007/11558989_3 | IPTPS |
Keywords | Field | DocType |
self-defense infrastructure,defense mechanism,peer-to-peer worm,p2p network,overlay topology,effective strategy,possible mitigation mechanism,member host,common vulnerability,design direction,p2p worm,p2p | Overlay topology,Virtual network,Psychological resilience,Peer-to-peer,Computer science,Computer security,Computer network,Exploit,Network topology,Vulnerability | Conference |
Volume | ISSN | ISBN |
3640 | 0302-9743 | 3-540-29068-0 |
Citations | PageRank | References |
64 | 2.86 | 17 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lidong Zhou | 1 | 2136 | 147.82 |
Lintao Zhang | 2 | 3512 | 200.80 |
Frank McSherry | 3 | 4289 | 288.94 |
Nicole Immorlica | 4 | 1636 | 100.87 |
Manuel Costa | 5 | 1589 | 88.62 |
Steve Chien | 6 | 323 | 19.12 |