Worm propagation analysis, including exploring mechanisms of worm propagation and formulating effects of network/worm parameters, has great importance for worm containment and host protection in P2P networks. Previous work only focuses on topological worm propagation where worms search a hosts neighbor-list to find new victims. In BitTorrent (BT) networks, the information from servers or trackers, however, could be fully exploited to design effective worms. In this paper, we propose a new approach for worm propagation in BT-like P2P networks. The worm, called Dynamic Hit-List (DHL) worm, locates new victims and propagates itself by requesting a tracker to build a dynamic hit list, which is a self-stopping BT worm to be stealthy. We construc...
Millions of users world-wide are sharing content using the Peer-to-Peer (P2P) client network. While ...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
Abstract—Recent active worm propagation events show that active worms can spread in an automated fas...
Worm propagation analysis, including exploring mecha-nisms of worm propagation and formulating effec...
Abstract―Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism fo...
Recent active worm propagation events show that active worms can spread in an automated fashion and ...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
malicious programs which could spread in an automated fashion and flood particular Peer-to-Peer (P2P...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
AbstractIt is commonly believed that the IPv6 provides greater security against worms by its huge ad...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
Abstract- Security of Peer-to-Peer (P2P) systems is a subject of strategic importance for ISPs (Inte...
xvi, 115 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2011 LuoBitTorrent (BT) is...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
Since the Morris worm was released in 1988, Internet worms continue to be one of top security threat...
Millions of users world-wide are sharing content using the Peer-to-Peer (P2P) client network. While ...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
Abstract—Recent active worm propagation events show that active worms can spread in an automated fas...
Worm propagation analysis, including exploring mecha-nisms of worm propagation and formulating effec...
Abstract―Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism fo...
Recent active worm propagation events show that active worms can spread in an automated fashion and ...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
malicious programs which could spread in an automated fashion and flood particular Peer-to-Peer (P2P...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
AbstractIt is commonly believed that the IPv6 provides greater security against worms by its huge ad...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
Abstract- Security of Peer-to-Peer (P2P) systems is a subject of strategic importance for ISPs (Inte...
xvi, 115 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2011 LuoBitTorrent (BT) is...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
Since the Morris worm was released in 1988, Internet worms continue to be one of top security threat...
Millions of users world-wide are sharing content using the Peer-to-Peer (P2P) client network. While ...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
Abstract—Recent active worm propagation events show that active worms can spread in an automated fas...