Methodology for detection and restraint of p2p applications in the network

作者: Rodrigo M. P. Silva , Ronaldo M. Salles

DOI: 10.1007/978-3-642-31128-4_24

关键词: Network packetComputer networkCommand and controlMalwareComputer scienceThe InternetBotnet

摘要: P2P networks are consuming more and Internet resources, it is estimated that approximately 70% of all carried traffic composed by packets from these networks. Moreover, they still represent the main infection vector for various types malware can be used as command control channel botnets, besides being famous notoriously to distribute a range pirated files (movies, music, games,...). In this paper we present some typical characteristics propose new architecture based on filters detect hosts running applications. We also provide methodology how prevent communication those in order avoid undesirable impacts operation network whole.

参考文章(22)
Andrew W. Moore, Konstantina Papagiannaki, Toward the Accurate Identification of Network Applications Lecture Notes in Computer Science. pp. 41- 54 ,(2005) , 10.1007/978-3-540-31966-5_4
T. Karagiannis, A. Broido, N. Brownlee, K.C. Claffy, M. Faloutsos, Is P2P dying or just hiding? [P2P traffic measurement] global communications conference. ,vol. 3, pp. 1532- 1538 ,(2004) , 10.1109/GLOCOM.2004.1378239
Emil Sit, Robert Tappan Morris, M Frans Kaashoek, None, UsenetDHT: a low-overhead design for Usenet networked systems design and implementation. pp. 133- 146 ,(2008)
Adrian Popescu, David Erman, Dragos Ilie, BitTorrent Session Characteristics and Models 3rd International Conference HET-NETs'05. ,(2005)
Wang Chunzhi, Jiang Wei, Chen Hong, Wei Luo, Hong Fang, Research on a method of P2P traffic identification based on multi-dimension characteristics international conference on computer science and education. pp. 1010- 1013 ,(2010) , 10.1109/ICCSE.2010.5593400
Randy Bush, FidoNet: technology, tools, and history Communications of the ACM. ,vol. 36, pp. 31- 35 ,(1993) , 10.1145/163381.163383
Haiman Lin, Ruilin Ma, Li Guo, Peng Zhang, XiaoJun Chen, Conducting routing table poisoning attack in DHT networks international conference on communications circuits and systems. pp. 254- 258 ,(2010) , 10.1109/ICCCAS.2010.5582015
Alexis Ulliac, Bogdan V. Ghita, Non-intrusive Identification of Peer-to-Peer Traffic 2010 Third International Conference on Communication Theory, Reliability, and Quality of Service. pp. 116- 121 ,(2010) , 10.1109/CTRQ.2010.27
Marios Iliofotou, Hyun-chul Kim, Michalis Faloutsos, Michael Mitzenmacher, Prashanth Pappu, George Varghese, Graption: A graph-based P2P traffic classification framework for the internet backbone Computer Networks. ,vol. 55, pp. 1909- 1920 ,(2011) , 10.1016/J.COMNET.2011.01.020