Font Size: a A A

Research On P2P Worm Defense Strategy Based On Unstructured P2P Network

Posted on:2009-09-25Degree:MasterType:Thesis
Country:ChinaCandidate:X S LiFull Text:PDF
GTID:2178360278472103Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the popularity of the Internet and the development of the broadband technology, software products whose core is P2P(peer-to-peer) technology become more and more popular and accepted by Internet users. Since 2000, many P2P software products emerged, such as Napster, Groove, OpenCOLA, Openext, Kugoo, and QQ, POCO etc. In just a few years, the volume of registered users is growing, and it becomes the Internet users'indispensable partners.When the P2P software becomes popularity, it also brings the inevitable security problem, in particular the harm created by the worm which uses the P2P network to be biggest. But in the face of the P2P worm, many defense strategies have been adapted, this paper will do some research on the worm under unstructured P2P network, the primary coverage includes:Firstly, we introduce the P2P network architecture and classification, and conduct a comprehensive analysis about the P2P network's inherent defects and some security problems.The paper proposes the new and precise definition of Internet worm: Internet worm is a program which can execute independently without intervention of computer users and propagate by compromising vulnerable computers partially of fully on the Internet. Generally the vulnerable computer has some problems, such as security vulnerability, weak passwords, bottom layer and application layer protocol vulnerability, open systems, human factors and so on. And then we analyzed the difference between worms and viruses, worm's function structure, and have a review of the Internet worm history, and propose the classification of the worm according to the different standard, and introduce the common prevention and detection technologies and propagation models.Secondly, we propose the new and precise definition of P2P worm, and then identify three types of non-scanning worms: passive worm, reactive worm and proactive worm. According to the worm's P2P network topology, P2P worms were divided into structured and unstructured P2P worms. Finally, we introduce the research status in P2P worm defense domain and point out the deficiencies.In view of this situation, this paper gives a new defense model: unstructured P2P network defense model based on super node and warning message. And then mainly expounds the key factors in model and give an algorithm.Finally, we use PeerSim and PeerSim Cooker to simulate the SWM model. The results indicate that the introduction of defense SWM model can curb the P2P worms in P2P network to a certain extent.
Keywords/Search Tags:Peer-to-Peer, Worm, Unstructured P2P, Node, SWM
PDF Full Text Request
Related items