Filters








876 Hits in 4.4 sec

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks

K K Ramachandran, B Sikdar
2011 IEEE Transactions on Dependable and Secure Computing  
In this paper, we formulate an analytical model to characterize the spread of malware in decentralized, Gnutella type peer-to-peer (P2P) networks and study the dynamics associated with the spread of malware  ...  The model is then extended to consider the impact of P2P networks on the malware spread in networks of smart cell phones.  ...  ACKNOWLEDGMENTS This work was supported in part by the US National Science Foundation (NSF) grant 0347623.  ... 
doi:10.1109/tdsc.2010.69 fatcat:i3gtkgdacjhilpr5nr3lqous2i

Preclusion Measures for Protecting P2P Networks from Malware Spread

P Manasa
2012 IOSR Journal of Computer Engineering  
Index Terms: Malware, peer-to-peer networks, compartmental model, Bit Torrent and Time to Live (TTL). I.  ...  Towards this end this paper presents an analytical model which can effectively characterize the true nature of malware and how it spreads in P2P networks such as Gnutella.  ...  This is required to characterize the dynamics and spread of malware in the decentralized P2P networks.  ... 
doi:10.9790/0661-0434045 fatcat:g6xucsvuora3hn6quwlihsk4r4

Modeling malware propagation in Gnutella type peer-to-peer networks

K. Ramachandran, B. Sikdar
2006 Proceedings 20th IEEE International Parallel & Distributed Processing Symposium  
In this paper, we model the spread of malware in decentralized, Gnutella type of peer-to-peer networks.  ...  We formulate an analytical model that emulates the mechanics of a decentralized Gnutella type of peer network and study the spread of malware on such networks.  ...  Conclusion In the current work, we motivated the need to understand the dynamics of malware spread, especially in the context of interacting heterogeneous environments such as peer-to-peer networks.  ... 
doi:10.1109/ipdps.2006.1639704 dblp:conf/ipps/RamachandranS06 fatcat:ghutxekuqbgajhdnc5vzjshe3y

Peer-to-Peer Botnet Investigation: A Review [chapter]

Mark Scanlon, Tahar Kechadi
2012 Lecture Notes in Electrical Engineering  
Botnet design, as a result, has moved away from the traditional, more traceable and easily blocked client/server paradigm towards a decentralized Peer-to-Peer (P2P) based communication system.  ...  Botnets have become the tool of choice to conduct a number of online attacks, e.g., distributed denial of service (DDoS), malware distribution, email spamming, phishing, advertisement click fraud, brute-force  ...  In this manner, a list of all known peers on the network can be compiled.  ... 
doi:10.1007/978-94-007-5064-7_33 fatcat:wlxrbihqe5btli4vg3lhie2msu

From ZeuS to Zitmo: Trends in Banking Malware

Najla Etaher, George R.S. Weir, Mamoun Alazab
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
A common example of banking malware is the ZeuS botnet. Recently, variants of this malware have targeted mobile platforms, as The-ZeuS-in-the-Mobile or Zitmo.  ...  In the crimeware world, financial botnets are a global threat to banking organizations. Such malware purposely performs financial fraud and steals critical information from clients' computers.  ...  Dynamically the IKee.B botnet scans the network of the iPhone IP addresses.  ... 
doi:10.1109/trustcom.2015.535 dblp:conf/trustcom/EtaherWA15 fatcat:usvlhz3birbqtp37tx24tvjbru

Intelligent Malware - Trends and Possibilities

Jan Plucar, Jiří Frank, Daniel Walter, Ivan Zelinka
2021 The MENDEL Soft Computing journal : International Conference on Soft Computing MENDEL  
For these reasons, our research group is engaged in creating experimental software with artificial intelligence to test the possibilities and capabilities of such malware in the event of its deployment  ...  These attacks are gaining strength and the sophistication of the approach in terms of how to attack.  ...  Dynamic malware analysis has proven to be a powerful tool. As a complement to dynamic analysis, network analysis is commonly performed.  ... 
doi:10.13164/mendel.2021.1.018 fatcat:yeyjk7qybff5jbrysobfhhn5wa

A Survey of Botnet Detection Techniques by Command and Control Infrastructure

Thomas Hyslip, Jason Pittman
2015 Journal of Digital Forensics, Security and Law  
Furthermore, the detection techniques aimed at decentralized and peer-to-peer botnets focus on detecting communications between the infected bots.  ...  Recent research has shown hierarchical clustering of flow data and machine learning are effective techniques for detecting botnet peer-to-peer traffic.  ...  botnets a majority of modern research has focused on detecting peer-to-peer and decentralized botnets, in particular, the communications between bots within the botnet.  ... 
doi:10.15394/jdfsl.2015.1195 fatcat:nqnh3reh3fcz3i53fuf5rzan4a

Peer-to-Peer Botnets [chapter]

Ping Wang, Baber Aslam, Cliff C. Zou
2010 Handbook of Information and Communication Security  
However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets.  ...  Botnet" is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today's Internet.  ...  [42] formulated an analytical model that emulates the mechanics of a decentralized Gnutella type of peer network and studied the spread of malware on such networks.  ... 
doi:10.1007/978-3-642-04117-4_18 fatcat:wu7unbuwaramzk7vkkujrex3ti

Agent-based modeling of malware dynamics in heterogeneous environments

Abhijit Bose, Kang G. Shin
2011 Security and Communication Networks  
The increasing convergence of power-law networks such as social networking and peer-to-peer applications, web-delivered applications, and mobile platforms makes today's users highly vulnerable to entirely  ...  In addition to traditional worms and viruses, the framework also allows modeling network coordination of malware such as botnets.  ...  While C&C is centralized in IRL botnets, P2P botnets such as Storm have developed a decentralized C&C model. In P2P botnets, each compromised host maintains a list of peers in the network.  ... 
doi:10.1002/sec.298 fatcat:2kxffi3kgngpzgy3unep4ze2te

Anomaly Threat Detection System using User and Role-Based Profile Assessment

U. Indumathy, M. Nivedha, Mrs. K. Alice
2018 International Journal of Trend in Scientific Research and Development  
In network security the organizations are ever growing to identify insider threats.  ...  Those who have authorized access to sensitive organizational placed in a position of power that could well be abused and could cause significant damage to an organization.  ...  based on three levels of alerts: policy violations and previously recog-nized attacks, threshold anomalies, and deviation-based The use of peer-to-peer (P2P) networks as a vehicle to spread malware offers  ... 
doi:10.31142/ijtsrd10956 fatcat:axkvlrjhrfhszlngpb7qmuld2i

Penny: Secure, Decentralized Data Management

Safwan Mahmud Khan, Kevin W. Hamlen
2014 International Journal of Network Security  
A decentralized reputation management system allows the network respond and adapt to malicious peers.  ...  This paper presents Penny, a structured P2P network that efficiently supports integrity and confidentiality labeling of data, and enforces a notion of ownership privacy that permits peers to publish data  ...  Any opinions, findings, conclusions, or recommendations expressed are those of the authors and do not necessarily reflect the views of the NSF.  ... 
dblp:journals/ijnsec/KhanH14a fatcat:en7ydhrchzbvngzs5mkjxl7n6y

X-Swarm: The Upcoming Swarm Worm

Thanh Cong Truong, Quoc Bao Diep, Ivan Zelinka, Than Trong Dao
2020 The MENDEL Soft Computing journal : International Conference on Soft Computing MENDEL  
To better understand the upcoming threat, in this manuscript, we investigate the design and mitigation of such malware.  ...  With the rapid growth of technology in the digital landscape, cybercriminals attempt to utilize new and sophisticated techniques to autonomous and increase the speed and scale of their attacks.  ...  Acknowledgement: The following grants are acknowledged for the financial support provided for this research: Grant of SGS No. SP2020/78, VSB Technical University of Ostrava.  ... 
doi:10.13164/mendel.2020.1.007 fatcat:l4psmggrivf5zhok7s6sbh52fi

Passive Worm and Malware Detection in Peer-to-Peer Networks

Sahar Fahimian, Amirvala Movahed, Mehdi Kharrazi
2010 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing  
In this paper, we investigate a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network.  ...  Internet worms and more generally malware are a major concern to the network security community.  ...  ACKNOWLEDGMENT The authors would like to thank Ali Ashrafi for assisting with the experimental setup, and Ali Fahimian for helpful discussions.  ... 
doi:10.1109/euc.2010.133 dblp:conf/euc/FahimianMK10 fatcat:qjrikor2j5eknlw4e3slmpvyf4

SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION

Nick Rahimi
2020 Zenodo  
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks.  ...  Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management.  ...  ATTACKS ON P2P NETWORK Creation of a decentralized peer to peer network was intended to equally spread services among participants. This, however, led to the emergence of security risks.  ... 
doi:10.5281/zenodo.3737915 fatcat:djvtn6t34fbxfi3d5txwqk7rxi

Security Consideration in Peer-to-peer Networks with A Case Study Application

Nick Rahimi
2020 International journal of network security and its applications  
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks.  ...  Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management.  ...  Additionally the evaluation results have shown that, the complexity of data lookup algorithms of the presented LDE-based P2P architecture outperforms DHT-based approaches.  ... 
doi:10.5121/ijnsa.2020.12201 fatcat:jdkqt3tgqfd23m6rfwqwa3a5xu
« Previous Showing results 1 — 15 out of 876 results