Filters








935 Hits in 3.2 sec

Bayesian Analysis of Secure P2P Sharing Protocols [chapter]

Esther Palomar, Almudena Alcaide, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS  
In this work, we show how Game Theory -particularly Bayesian games-can be an useful tool to analyze in a formal manner a P2P security scheme.  ...  Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges.  ...  In Section 2, we provide a brief overview of some related work. Section 3 formally presents our secure P2P content sharing protocol.  ... 
doi:10.1007/978-3-540-76843-2_41 dblp:conf/otm/PalomarAEC07 fatcat:b7t5yujvw5cmxonius6e7s5zsy

SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification

Yingjie Xia, Guanghua Song, Yao Zheng
2008 Journal of Computers  
In conclusion, the SW-R2P system collectively exploits the advantages of small world, zero knowledge identification and Bayesian trust model, therefore implementing a scalable, secure and efficient P2P  ...  In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation based access control policies  ...  ACKNOWLEDGMENT This work was fully supported by the National Natural Science Foundation of China under grant Number 90412014.  ... 
doi:10.4304/jcp.3.10.3-11 fatcat:plpsfp7ezrcujjj3achvmtygjq

Capsule Reviews

2005 Computer journal  
Hashing of databases with the use of metric properties of the hamming space. V.  ...  Balakirsky Hashing of databases is a particular approach to the storage of a collection of items and the retrieval of those items of the collection whose key values match given key values.  ...  Information flow analysis for fail-secure devices. A. Rae and C. Fidge It is important that security properties are preserved even in the event of failure of an information security device.  ... 
doi:10.1093/comjnl/bxh069 fatcat:7mgwvsfdbnc3tjhkyvjhr3w7by

BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES

Anchit Bijalwan, Vijender Kumar Solanki, Emmanuel Shubhakar Pilli
2018 Network Protocols and Algorithms  
This paper enlightens the novel summary of previous survey including life cycle, classification, framework, detection, analysis and the challenges for botnet forensics.  ...  Botnet forensic is utilized to strengthen the security issues by understanding the modus operandi of the attacks.  ...  Protocol analysis, protocols are the set of rules of a particular action. Network Protocols and Algorithms Lu et al.  ... 
doi:10.5296/npa.v10i2.13144 fatcat:4jslahx72nhobnabo25scj3yzi

A Closer Look at the HTTP and P2P Based Botnets from a Detector's Perspective [chapter]

Fariba Haddadi, A. Nur Zincir-Heywood
2016 Lecture Notes in Computer Science  
To this end, we studied the differences of three machine learning techniques (Decision Tree, Genetic Programming and Bayesian Networks).  ...  In our analysis, we employed four HTTP based publicly available botnet data sets (namely Citadel, Zeus, Conficker and Virut) and four P2P based publicly available botnet data sets (namely ISOT, NSIS, ZeroAccess  ...  The CSSP is led by the Defense Research and Development Canada, Centre for Security Science (CSS) on behalf of the Government of Canada and its partners across all levels of government, response and emergency  ... 
doi:10.1007/978-3-319-30303-1_13 fatcat:37tngtd4qjeannpxxufwwujrbq

A P2P Botnet Virus Detection System Based on Data-Mining Algorithms

Wernhuar Tarng
2012 International Journal of Computer Science & Information Technology (IJCSIT)  
The system can detect P2P botnet viruses in the early stage of infection and report to network managers to avoid further infection.  ...  After trained by adjusting the system parameters using test samples, the experimental results show that the accuracy of Bayes Classifier is 95.78% and that of NN Classifier is 98.71% in detecting P2P botnet  ...  Acknowledgement The authors wish to thank for the financial support of the National Science Council of the Republic of China under the contract number NSC 101-2631-S-008-001.  ... 
doi:10.5121/ijcsit.2012.4505 fatcat:mjknp2dg4bh2vlxe4roiewwtpa

An Efficient Trust Mechanism in P2P Network

Zhenquan Qin, Lei Wang, Mingchu Li, Weifeng Sun
2010 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
With the proliferation of P2P application, it is critical to consider how these systems can be run in a trust environment.  ...  Simulation results show that Tw-Trust has the advantages in countering strategic altering behavior and dishonest feedbacks of malicious peers.  ...  Many works have been done to secure the P2P systems mainly in two aspects, one is to secure the content transmitted by peers through symmetric or asymmetric cryptography, while the other secures the protocols  ... 
doi:10.1109/iihmsp.2010.185 dblp:conf/iih-msp/QinWLS10 fatcat:k6e4uxiflrcwpibti5xmrgpz4q

Analysis of Peer-to-Peer Botnet Attacks and Defenses [chapter]

Ping Wang, Lei Wu, Baber Aslam, Cliff C. Zou
2015 Intelligent Systems Reference Library  
Then we provide mathematical analysis of two P2P botnet elimination approaches -index poisoning defense and Sybil defense, and one P2P botnet monitoring technique -passive monitoring based on infiltrated  ...  Due to the distributive nature of P2P networks, P2P botnets are more resilient to defense countermeasures.  ...  First, a security defect of P2P protocol itself is the root cause.  ... 
doi:10.1007/978-3-319-15916-4_8 fatcat:howuyeivvrh27fd2jlnk2w4srq

PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations

Pratik Narang, Subhajit Ray, Chittaranjan Hota, Venkat Venkatakrishnan
2014 2014 IEEE Security and Privacy Workshops  
PeerShark could also classify different P2P applications with an accuracy of more than 95%.  ...  Instead of the traditional 5-tuple 'flow-based' detection approach, we use a 2-tuple 'conversation-based' approach which is port-oblivious, protocol-oblivious and does not require Deep Packet Inspection  ...  ACKNOWLEDGMENT This work was supported by Grant number 12(13)/2012-ESD for scientific research under Cyber Security area from the Department of Information Technology, Govt. of India, New Delhi, India.  ... 
doi:10.1109/spw.2014.25 dblp:conf/sp/NarangRHV14 fatcat:frwjiw7rsbdi7c5yqonpw5xily

Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP [chapter]

Maria Chiara Laghi, Michele Amoretti, Gianni Conte
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
A considerable standardization effort is being carried out from both SOA and P2P communities, but a complete platform for the development of secure, distributed applications is still missing.  ...  In this context, the result of our research and development activity is JXTA-SOAP, an official extension for JXTA enabling Web Service sharing in peer-to-peer networks.  ...  In [8] , security issues that occur in the underlying routing protocol are described, as well as fairness and trust issues that occur in file sharing and other P2P applications.  ... 
doi:10.1007/978-3-642-04434-2_18 fatcat:wmqwxlt4ira73ml6p7dui2qpda

Report on international workshop on privacy and anonymity in the information society (PAIS 2008)

Li Xiong, Traian Marius Truta, Farshad Fotouhi
2009 SIGMOD record  
First of all, we would like to thank our keynote speaker and the authors for providing the quality content of the program.  ...  Finally, we would like to thank the UNESCO Chair in Data Privacy for their travel support and the EDBT 2008 conference for their support of the workshop.  ...  A MPC protocol is secure if no participant can learn more from the description of the public function and the result of function.  ... 
doi:10.1145/1519103.1519125 fatcat:bndxedyyz5a3bkmpb73y4rnrxi

Detection and classification of peer-to-peer traffic

João V. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro
2013 ACM Computing Surveys  
In spite of the share of global traffic of each Internet application, P2P systems motivate particular attention from the perspective of network management for the dual role their peers play.  ...  security risks and vulnerabilities [Zhou et al. 2005; Seedorf 2006; Johnson et al. 2008 Johnson et al. , 2009 Chopra et al. 2009 ] that are magnified by the distributed nature of P2P systems and by the  ...  The discussion of each of these categories may be appropriate or not, depending on the purpose of each monitoring study or tool.  ... 
doi:10.1145/2480741.2480747 fatcat:xqwmadnauncplgibq7lbwxapbu

Digital Business Models for Peer-to-Peer Networks: Analysis and Economic Issue

Ramayya Krishnan, Michael D. Smith, Zhulei Tang, Rahul Telang
2007 Review of Network Economics  
Peer-to-peer (P2P) services allow users to share networked resources, notably bandwidth and content, from the edges of the network.  ...  These services have been popularized because of file sharing – particularly the sharing of unlicensed copyrighted files.  ...  Implementation of sharing mechanisms Though the underlying principle of the P2P protocol is to stimulate sharing of network resources, implementing these protocols can be a nontrivial task.  ... 
doi:10.2202/1446-9022.1117 fatcat:zs6wj4epkzbf5hdw6scpcj5p7m

Digital Business Models for Peer-to-Peer Networks: Analysis and Economic Issues

Ramayya Krishnan, Michael D. Smith, Zhulei Tang, Rahul Telang
2006 Social Science Research Network  
Peer-to-peer (P2P) services allow users to share networked resources, notably bandwidth and content, from the edges of the network.  ...  These services have been popularized because of file sharing -particularly the sharing of unlicensed copyrighted files. However, content owners are increasingly exploring the ability of peer-to-peer  ...  Implementation of sharing mechanisms Though the underlying principle of the P2P protocol is to stimulate sharing of network resources, implementing these protocols can be a nontrivial task.  ... 
doi:10.2139/ssrn.917899 fatcat:rbliq3k7pncfxl4rbfpxdkfgjm

PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification

Pratik Narang, Chittaranjan Hota, VN Venkatakrishnan
2014 EURASIP Journal on Information Security  
Our approach neither assumes the availability of any 'seed' information of bots nor relies on deep packet inspection. It aims to detect the stealthy behavior of P2P botnets.  ...  P2P botnets are not prone to any single point of failure and have been proven to be highly resilient against takedown attempts.  ...  Acknowledgements This work was supported by grant number 12(13)/2012-ESD for scientific research under Cyber Security area from the Department of Information Technology, Govt. of India, New Delhi, India  ... 
doi:10.1186/s13635-014-0015-3 fatcat:yhldbjuexzguvgfubnraeutkii
« Previous Showing results 1 — 15 out of 935 results