According to the features of worm propagation, a novel model for proactive worm prevention based on peer-to-peer (P2P) networking technologies is proposed in this paper. At first, we present the backgrounds and security issues related to P2P networks. Then, a structured P2P overlay network designed for worm prevention is specified. Based on that, we present the methods for Internet worm forecasting which is assumed to be unknown. Furthermore, we study effective strategies to restrain and eliminate worms under the model. We find that our proposed P2P-based worm prevention model can efficiently reduce the impact of worms on the networks. Keywords: Worm prevention; P2P overlay network; Internet worm forecastin
With the popularity of P2P (Peer-to-Peer) network applications, active P2P worms become one of the m...
Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages t...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
Abstract- Security of Peer-to-Peer (P2P) systems is a subject of strategic importance for ISPs (Inte...
Recently there have been increasing attentions on the security aspects in Peer-to-Peer (P2P) network...
The frequency and scale of worm attacks on the Internet are increasing each year. The speed and seve...
malicious programs which could spread in an automated fashion and flood particular Peer-to-Peer (P2P...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
Peer-to-Peer (P2P) worms have become a serious problem on the Internet because of its adaptive propa...
Active Peer-to-Peer worms are great threat to the network security since they can propagate in autom...
Recent active worm propagation events show that active worms can spread in an automated fashion and ...
Abstract—Recent active worm propagation events show that active worms can spread in an automated fas...
Recent active worm propagation events show that active worms can spread in an automated fashion and ...
Worm propagation analysis, including exploring mechanisms of worm propagation and formulating effect...
With the popularity of P2P (Peer-to-Peer) network applications, active P2P worms become one of the m...
Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages t...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
Abstract- Security of Peer-to-Peer (P2P) systems is a subject of strategic importance for ISPs (Inte...
Recently there have been increasing attentions on the security aspects in Peer-to-Peer (P2P) network...
The frequency and scale of worm attacks on the Internet are increasing each year. The speed and seve...
malicious programs which could spread in an automated fashion and flood particular Peer-to-Peer (P2P...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
Peer-to-Peer (P2P) worms have become a serious problem on the Internet because of its adaptive propa...
Active Peer-to-Peer worms are great threat to the network security since they can propagate in autom...
Recent active worm propagation events show that active worms can spread in an automated fashion and ...
Abstract—Recent active worm propagation events show that active worms can spread in an automated fas...
Recent active worm propagation events show that active worms can spread in an automated fashion and ...
Worm propagation analysis, including exploring mechanisms of worm propagation and formulating effect...
With the popularity of P2P (Peer-to-Peer) network applications, active P2P worms become one of the m...
Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages t...
stract Active worms propagate across networks by employing various target discovery techniques. It i...