On the effectiveness of internal patching against file-sharing worms

作者: Liang Xie , Hui Song , Suncun Zhu

DOI: 10.1007/978-3-540-68914-0_1

关键词:

摘要: File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users' individual recoveries or limiting file-sharing activities are ineffective. Automated patching tools such as Microsoft Windows Update and Symantec Security currently the most popular vehicles for eliminating containing Internet worms, but they not necessarily best fits combating P2P which propagate within a relatively smaller community. In this paper, we propose complementary P2P-tailored system utilizes existing mechanisms to internally disseminate security patches those participating peers timely distributed fashion. Specifically, examine effectiveness of leveraging file downloading searching process notify vulnerable end hosts surging push corresponding updates these hosts. We show through in-depth analysis extensive experiments that both methods scalable effective worms.

参考文章(20)
Jon Crowcroft, Antony Rowstron, Miguel Castro, Manuel Costa, Can we contain Internet worms Association for Computing Machinery, Inc.. pp. 7- ,(2004)
Peter Biddle, Bryan Willman, Paul England, Marcus Peinado, The Darknet and the Future of Content Distribution Research Papers in Economics. ,(2003)
Sam Joseph, NeuroGrid: Semantically Routing Queries in Peer-to-Peer Networks Lecture Notes in Computer Science. pp. 202- 214 ,(2002) , 10.1007/3-540-45745-3_18
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien, A First Look at Peer-to-Peer Worms: Threats and Defenses Peer-to-Peer Systems IV. pp. 24- 35 ,(2005) , 10.1007/11558989_3
Peter Biddle, Paul England, Marcus Peinado, Bryan Willman, The Darknet and the Future of Content Protection digital rights management. pp. 155- 176 ,(2003) , 10.1007/978-3-540-44993-5_10
Nathaniel S. Good, Aaron Krekelberg, Usability and privacy: a study of Kazaa P2P file-sharing human factors in computing systems. pp. 137- 144 ,(2003) , 10.1145/642611.642636
Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Kruegel, Anomalous system call detection ACM Transactions on Information and System Security. ,vol. 9, pp. 61- 93 ,(2006) , 10.1145/1127345.1127348
Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith W. Ross, Dan Rubenstein, Fluid modeling of pollution proliferation in P2P networks ACM SIGMETRICS Performance Evaluation Review. ,vol. 34, pp. 335- 346 ,(2006) , 10.1145/1140103.1140316
D. Brumley, J. Newsome, D. Song, Hao Wang, Somesh Jha, Towards automatic generation of vulnerability-based signatures ieee symposium on security and privacy. pp. 2- 16 ,(2006) , 10.1109/SP.2006.41
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis, Countering code-injection attacks with instruction-set randomization computer and communications security. pp. 272- 280 ,(2003) , 10.1145/948109.948146