Filters








1,882 Hits in 8.6 sec

Spam characterization and detection in peer-to-peer file-sharing systems

Dongmei Jia, Wai Gen Yee, Ophir Frieder
2008 Proceeding of the 17th ACM conference on Information and knowledge mining - CIKM '08  
Spam is highly pervasive in P2P file-sharing systems and is difficult to detect automatically before actually downloading a file due to the insufficient and biased description of a file returned to a client  ...  To alleviate this problem, we first characterize spam and spammers in the P2P file-sharing environment and then describe feature-based techniques for automatically detecting spam in P2P query result sets  ...  To improve the usability of P2P file-sharing systems, it is important to develop effective spam detection techniques.  ... 
doi:10.1145/1458082.1458128 dblp:conf/cikm/JiaYF08 fatcat:mkzwo5miozc6zbu3u6swqbtghm

Cost-effective spam detection in p2p file-sharing systems

Dongmei Jia
2008 Proceeding of the 2008 ACM workshop on Large-Scale distributed systems for information retrieval - LSDS-IR '08  
Spam is highly pervasive in P2P file-sharing systems and is difficult to detect automatically before actually downloading a file due to the insufficient and biased description of a file returned to a client  ...  To alleviate this problem, we propose probing technique to collect more complete feature information of query results from the network and apply feature-based ranking for automatically detecting spam in  ...  "FEATURES" OF P2P SPAM In our previous work on spam characterization [9] , we investigate the correlations between prevalence of spam and several features of shared files and the peers that share them  ... 
doi:10.1145/1458469.1458483 dblp:conf/cikm/Jia08 fatcat:h2ztzahwxze3pmus6nldxdmaty

Enhanced Peer-to-Peer based Botnet Detection Method with Intrusion Free Network Scheme

Megha Godage, A. A., R. S.
2017 International Journal of Computer Applications  
Peer-to-Peer [P2P] networks usually has the ability to perform bidirectional communication efficiently, which means both the sending and receiving end has the same transactional power and ability to communicate  ...  Simultaneously this system efficiently identifies the performance scenario of the P2P network and makes the system more scalable in further processing.  ...  those activities, that are a piece of honest to goodness Peer-to-Peer systems (for instance, file sharing systems) and Peer-to-Peer bots.  ... 
doi:10.5120/ijca2017915927 fatcat:vf2gwvk6hzd73gn2bsl7zuh5pq

BTWorld

Maciej Wojciechowski, Mihai Capotâ, Johan Pouwelse, Alexandru Iosup
2010 Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing - HPDC '10  
Today, the BitTorrent Peer-to-Peer file-sharing network is one of the largest Internet applications-it generates massive traffic volumes, it is deployed in thousands of independent communities, and it  ...  We also show that BT-World can shed light on BitTorrent phenomena, such as the presence of spam trackers and giant swarms.  ...  The BitTorrent File-Sharing Network BitTorrent is a peer-to-peer file-sharing system for exchanging content in the form of (bundles of) files.  ... 
doi:10.1145/1851476.1851562 dblp:conf/hpdc/WojciechowskiCPI10 fatcat:55fsg636urdnlhrqbsjellf7ne

Adversarial Information Retrieval on the Web (AIRWeb 2007)

Carlos Castillo, Kumar Chellapilla, Brian D. Davison
2008 SIGIR Forum  
Acknowledgments We extend our sincere thanks to WWW2007, to the authors and presenters, and to the members of the program committee for their contributions to the material that formed an outstanding workshop  ...  Decentralized reputation management is used to describe the performance and reliability of machines in file sharing peer-to-peer networks.  ...  In addition, the workshop included a web spam challenge for testing web spam detection systems.  ... 
doi:10.1145/1394251.1394267 fatcat:ywd3ygzofbbjtbwxshwgu3opy4

Security in P2P Networks: Survey and Research Directions [chapter]

Esther Palomar, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
2006 Lecture Notes in Computer Science  
After Napster success -the first P2P file sharing application massively used-, advances in this area have been intense, with the proposal of many new architectures and applications for content and computing  ...  A fundamental feature of Peer-to-Peer (P2P) networks is the honest collaboration among an heterogeneous community of participants.  ...  P2P networks are useful not only for relatively simple file sharing systems, in which the main goal is directly exchanging contents with others.  ... 
doi:10.1007/11807964_19 fatcat:qqbpckz7hnagxcg5se6rdylxjm

Collaborative Security

Guozhu Meng, Yang Liu, Jie Zhang, Alexander Pokluda, Raouf Boutaba
2015 ACM Computing Surveys  
Thus far, collaboration has been used in many domains such as intrusion detection, spam filtering, botnet resistance, and vulnerability detection.  ...  Collaborative security is an abstract concept that applies to a wide variety of systems and has been used to solve security issues inherent in distributed environments.  ...  Spammers always do some tiny alternations to spam in order to escape the inspection of anti-spam systems, which leads to being useless for anti-spam systems to share exact spam.  ... 
doi:10.1145/2785733 fatcat:mu6hd7jk4vgjxhdhkpvjuose4e

Botnets: How to Fight the Ever-Growing Threat on a Technical Level [chapter]

Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini
2013 SpringerBriefs in Cybersecurity  
In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status.  ...  This chapter gives a technical insight into current botnet techniques and discusses state of the art countermeasures to combat the botnet threat in detail.  ...  To enforce the transmission to other systems, computer viruses may not only infect local files but also files on removable media or mounted network shares.  ... 
doi:10.1007/978-1-4471-5216-3_2 fatcat:m5uyvssccbd7vmzwnhtk35gzme

Survey of Peer-to-Peer Botnets and Detection Frameworks

Ramesh Singh Rawat, Emmanuel S. Pilli, Ramesh Chandra Joshi
2018 International Journal of Network Security  
The decentralized Peer-to-Peer (P2P) botnets have appeared in the recent past and are growing at a faster pace.  ...  This paper is useful in understanding the P2P botnets and gives an insight into the usefulness and limitations of the various P2P botnet detection techniques proposed by the researchers.  ...  The method relies on the assumptions that the bot peers look for popular resources like the command files issued by the botmaster and further share them with other peer bots in a short period of time.  ... 
dblp:journals/ijnsec/RawatPJ18 fatcat:dm7i5mh2czasvdlblrzyucowr4

Survey and Research Challenges of Botnet Forensics

Anchit Bijalwan, Meenakshi Thapaliyal, Emmanuel S Piili, R. C. Joshi
2013 International Journal of Computer Applications  
Latest attacks are increasingly complex, and utilize many strategies in order to perform their intended malicious/hazardous task.  ...  These papers propose the advanced approach related botnet detection and analysis in the near future. It demonstrates a novel approach of botnet investigations and defense mechanisms.  ...  In a peer to peer architecture a node can act as both client and server and there is lack of centralized point for command and control.  ... 
doi:10.5120/13127-0483 fatcat:kre55acihzd3lb7sumar2mu7pu

Guarding Against Large-Scale Scrabble In Social Network

Geerthidevi K G, Dr. T. Senthil Prakash, Prakadeswaran M.E
2014 International Journal of Computer Applications Technology and Research  
A efficient stastical data classifier is required to train the botent preventions system.  ...  To provide the above features clustering based analysis is done. our approach can detect and profile various P2P applications rather than identifying a specific P2P application.  ...  Flows corresponding to ping/pong and peer-discovery share similar sizes, and hence they are grouped into two clusters (FC1 and FC2), respectively.  ... 
doi:10.7753/ijcatr0312.1009 fatcat:r7fm6qg6xvhspceg24n2obo5ue

Cooperative forensics sharing

Fareed Zaffar, Gershon Kedem
2006 Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems - BIONETICS '06  
Foresight utilizes this infrastructure to share a global threat view in order to detect unknown threats and isolate them.  ...  System performance analysis through tracebased simulations show significant benefits for sharing forensics across cooperating domains.  ...  Our simulations showed an increased detection of email-borne threats and the system was able to correctly detect around 75% of emails that even Spam-Assassin was unable to detect.  ... 
doi:10.1145/1315843.1315875 dblp:conf/bionetics/ZaffarK06 fatcat:gqgljqdpkzbpdfnkmambbni4uy

Cooperative Forensics Sharing

Fareed Zaffar, Gershon Kedem
2006 2006 1st Bio-Inspired Models of Network, Information and Computing Systems  
Foresight utilizes this infrastructure to share a global threat view in order to detect unknown threats and isolate them.  ...  System performance analysis through tracebased simulations show significant benefits for sharing forensics across cooperating domains.  ...  Our simulations showed an increased detection of email-borne threats and the system was able to correctly detect around 75% of emails that even Spam-Assassin was unable to detect.  ... 
doi:10.1109/bimnics.2006.361814 fatcat:6cwxqlib55g27ne46a6tq6mj2a

Collaborative Spam Filtering Using E-Mail Networks

J.S. Kong, B.A. Rezaei, N. Sarshar, V.P. Roychowdhury, P.O. Boykin
2006 Computer  
As one particular example of such collaborative systems, we provide a design of a spam filtering system, and our large-scale simulations show that the system achieves a spam detection rate close to 100  ...  has several advantages over other recent proposals (i) It uses an already existing network, created by the same social dynamics that govern our daily lives, and no dedicated peer-to-peer (P2P) systems  ...  This work was supported in part by NSF grants ITR:ECF0300635 and BIC:EMT0524843.  ... 
doi:10.1109/mc.2006.257 fatcat:uf5poxuexbhtvgw7ljh23mmfku

A Survey of Botnet Technology and Defenses

Michael Bailey, Evan Cooke, Farnam Jahanian, Yunjing Xu, Manish Karir
2009 2009 Cybersecurity Applications & Technology Conference for Homeland Security  
In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today's networks intersect to inform the field  ...  Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations.  ...  P2P: Peer-to-peer (P2P) botnet communication has several important advantages over centralized networks. First, a P2P communication system is much harder to disrupt.  ... 
doi:10.1109/catch.2009.40 fatcat:x6phcz3vorfwnoxdl6q5p5g264
« Previous Showing results 1 — 15 out of 1,882 results