Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Centeralized Mechanism For Passive Worm Detection And Throttling In P2P Networks

Author : Gokul K 1 Karthik L P. 2 Mohan S. 3 Femila Goldy R. 4

Date of Publication :7th March 2015

Abstract: Over the years, worms have emerged as a main source of trouble in P2P networks. If worm enters the system it immediately starts affecting the system activities. Also the system gets slower. If it is a distributed system and many systems are connected in peer to peer format then the systems that are connected to the infected system may also get affected. In order to prevent the system from worm, passive worm detection method is used. In this method, one system in a network acts as guardian system and other system in the network acts as child system. If any system is affected by worm, the request is given to the guardian system. The guardian system sends an alert message to other systems in the network. By using patch framework the guardian system rectifies the worm problem from the system which has been affected by worm. Hence the systems in the network were protected from worms.

Reference :

    1. Yini Wang, Sheng Wen, Yang Xiang, and Wanlei “Modeling the propagation of Worms in Networks: A Survey”, vol. 16,no. 2, second quarter 2014.
    2. Napster homepage, http://www.napster.com
    3. Gnutella homepage, http://www.gnutella.com/
    4. Eric Chien, “Malicious Threats of Peer-to-Peer Networking”, Symantec White Paper, 2003.
    5. www.cim.mcgill.ca/~sveta/COMP102/P2P.pdf
    6. William Stallings, “Cryptography and Network Security, Principles and Practice”, Second Edition, Prentice Hall Publishing, ISBN-13: 9780130914293, 2001.
    7. Lidong Zhou et al., “A First Look at Peer-to-Peer Worms: Threats and Defenses”, Book Chapter, Peer-to-Peer Systems IV, Springer Publishing, 2005.
    8. Bo Zhan et al., “Defense against Passive Worms in P2P Networks”, Proceedings of Networking & Electronic Commerce Research Conference (NAEC 2008), 2008.
    9. Guanling Chen et al., “Simulating Non-Scanning Worms on Peer-to- Peer Networks”, Proceedings of INFOSCALE '06, Hong Kong, 2006.
    10. Zhiguang Qin , “Propagation Models of Passive Worms in P2P Networks”, IEEE International Conference on Machine Learning and Cybernetics (ICMLC), 2008
    11. S. Staniford et al., “How to Own the Internet in Your Spare Time”, Proceedings of the 11th USENIX Security Symposium, San Francisco, 2002

Recent Article