Improved Distributed Framework for Worm Detection & Throttling in Mobile Peer-to-Peer Networks

نویسندگان

  • Muhammad Adeel
  • Laurissa N. Tokarchuk
  • Laurie G. Cuthbert
  • Chao-sheng Feng
  • Zhiguang Qin
چکیده

Peer-to-Peer (P2P) applications are becoming more prevalent in mobile 3G/4G devices. Categorized as collaborative P2P applications, MSN, ICQ and Yahoo IM are in use for years, while recently, filesharing P2P applications like Nokia mBit and PeerBox have also been introduced. Contemporary mobile peers are capable of sharing P2P content using Bluetooth technology i.e. bypassing cellular vendor’s network altogether. Mobile devices are resource constrained in terms of memory and processing thus security threats like scanning and non-scanning worms could result in choking these resources. 3G/4G mobile devices come equipped with no significant software for detection of such an immense threat and hence, worms could exploit vulnerabilities to cause catastrophes. Worms are capable of propagation through mobile P2P networks using three known approaches; content sharing using cellular vendor’s network, through Bluetooth communication directly among different peers and through MMS and SMS messaging. Authors have come up with distinctive ideas to deal with such threats, however, most of them focus solely on one way of threat propagation at any instance of time, unrealistically discarding all other windows of threat propagation. Some approaches target only one specific worm or worm behaviour. There have been over four hundred mobile P2P worms discovered so far and hence the scope of current detection mechanisms comes to literally a nought. We bring in a unified framework for worm detection & throttling in mobile P2P networks that deals with epidemiological spreading of worms through all three windows of propagation. Solution delegates guardian nodes in the network to throttle worms once detected through collaborative information sharing between mobile devices and the guardian nodes. It targets different types of worm behaviours, hence giving it a significant edge over previous approaches. By employing artificial intelligence techniques, the framework can adapt to tackle ever-evolving worm attack strategies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Mobile P2P Malware Detection Framework through Cabir & Commwarrior Families

Mobile Peer-to-Peer (P2P) malware has emerged as one of the major challenges in mobile network security in recent years. Around four hundred mobile viruses, worms, trojans and spyware, together with approximately one thousand of their variants have been discovered to-date. So far no classification of such mobile P2P security threats exists. There is no well known simulation environment to model...

متن کامل

A Novel Caching Strategy in Video-on-Demand (VoD) Peer-to-Peer (P2P) Networks Based on Complex Network Theory

The popularity of video-on-demand (VoD) streaming has grown dramatically over the World Wide Web. Most users in VoD P2P networks have to wait a long time in order to access their requesting videos. Therefore, reducing waiting time to access videos is the main challenge for VoD P2P networks. In this paper, we propose a novel algorithm for caching video based on peers' priority and video's popula...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

Extending Wide-Area Replication Support with Mobility and Improved Recovery

We survey the MADIS architecture. It supports high availability, fault tolerance and seamless error recovery in computer networks for peer-to-peer computing and other distributed web services. MADIS is open for plugging in different protocols for replication, resilience and recuperation. We recapitulate two protocols which ensure fault tolerance and efficient error recovery. We outline ongoing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JDCTA

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2009