Phagocytes: A Holistic Defense and Protection Against Active P2P Worms
نویسندگان
چکیده
Active Peer-to-Peer (P2P) worms present serious threats to the global Internet by exploiting popular P2P applications to perform rapid topological self-propagation. Active P2P worms pose more deadly threats than normal scanning worms because they do not exhibit easily detectable anomalies, thus many existing defenses are no longer effective. We propose an immunity system with Phagocytes — a small subset of elected P2P hosts that are immune with high probability and specialized in finding and “eating” worms in the P2P overlay. The Phagocytes will monitor their managed P2P hosts’ connection patterns and traffic volume in an attempt to detect active P2P worm attacks. Once detected, local isolation, alert propagation and software patching will take place for containment. The Phagocytes further provide the access control and filtering mechanisms for communication establishment between the internal P2P overlay and the external hosts. We design a novel adaptive and interaction-based computational puzzle scheme at the Phagocytes to restrain external worms attacking the P2P overlay, without influencing legitimate hosts’ experiences significantly. We implement a prototype system, and evaluate its performance based on realistic massive-scale P2P network traces. The evaluation results illustrate that our Phagocytes are capable of achieving a total defense against
منابع مشابه
Active Worm Propagation Modeling in Unstructured P2P Networks
Nowadays, the security of P2P networks is alarming ascribing to worms which propagate by exploiting common vulnerabilities in P2P software. Taking account of the topology of P2P networks and the behavior of worms, this paper models the propagation of active worms in unstructured P2P networks. Simulations indicate that propagation of worms in P2P networks is much faster than that in un-P2P netwo...
متن کاملPeer-to-peer system-based active worm attacks: Modeling, analysis and defense
0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.08.008 * Corresponding author. Tel.: +1 214 208 5951. E-mail addresses: [email protected] (W. Yu), ch pan), [email protected] (X. Wang), xuan@cs Active worms continue to pose major threats to the security of today’s Internet. This is due to the ability of active worms to automatically propagate themselves and co...
متن کاملA Defense Model of Reactive Worms Based on Dynamic Time
The popularity of reactive worms, whose attacking behavior inherits characteristics from both active worms and passive worms, has brought great threat to P2P networks in recent years. Most existing defense models only focus on the effects of P2P churn on reactive worm's propagation, but neglect the impact of user behaviors on the spread of worms. This paper proposes a defense model of reactive ...
متن کاملPropagation of Active Worms in P2P Networks: Modeling and Analysis
Active worms, a category of self-replicating malicious programs which could spread in an automated fashion and flood particular Peer-to-Peer (P2P) networks within very short time, have drawn significant attention. However, only limited number of studies focus on propagation model of active worms with fair consideration of P2P nodes’ dynamic features consisting of P2P churn, random quarantine, r...
متن کاملConcept, Characteristics and Defending Mechanism of Worms
Worms are a common phenomenon in today’s Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types– Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The In...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1108.1350 شماره
صفحات -
تاریخ انتشار 2011