z-logo
open-access-imgOpen Access
A First Look at Peer-to-Peer Worms: Threats and Defenses
Author(s) -
Lidong Zhou,
Lintao Zhang,
Frank McSherry,
Nicole Immorlica,
Manuel Costa,
Steve Chien
Publication year - 2005
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
ISBN - 3-540-29068-0
DOI - 10.1007/11558989_3
Subject(s) - computer science , exploit , resilience (materials science) , overlay network , computer security , peer to peer , computer network , distributed computing , world wide web , the internet , physics , thermodynamics
Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strategy than random scanning for locating victims. This paper describes the danger posed by P2P worms and initiates the study of possible mitigation mechanisms. In particular, the paper explores the feasibility of a self-defense infrastructure inside a P2P network, outlines the challenges, evaluates how well this defense mechanism contains P2P worms, and reveals correlations between containment and the overlay topology of a P2P network. Our experiments suggest a number of design directions to improve the resilience of P2P networks to worm attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom