On the Privacy of Peer-Assisted Distribution of Security Patches

作者: D. Wu , C. Tang , P. Dhungel , N. Saxena , K. W. Ross

DOI: 10.1109/P2P.2010.5569988

关键词:

摘要: When a host discovers that it has software vulnerability is susceptible to an attack, the needs obtain and install patch. Because centralized distribution of patches may not scale well, peer-to-peer (P2P) approaches have recently been suggested. There is, however, serious privacy problem with peer-assisted patch distribution: when peer A requests from another B, announces B its vulnerability, which can exploit instead providing Through analytical modeling simulation, we show large majority vulnerable hosts will typically become compromised basic design for peer- assisted distribution. We then study effectiveness two different in countering this problem. The first approach utilizes special-purpose nodes, referred as honeypots, discover blacklist malicious peers listening hosts. In second approach, are requested through anonymizing network, hiding identities peers. Using models that, honeypots do completely solve problem; contrast, network turns out be more suitable security

参考文章(23)
Liang Xie, Hui Song, Suncun Zhu, On the effectiveness of internal patching against file-sharing worms applied cryptography and network security. pp. 1- 20 ,(2008) , 10.1007/978-3-540-68914-0_1
Peyman Kabiri, Ali A. Ghorbani, RESEARCH ON INTRUSION DETECTION AND RESPONSE: A SURVEY International Journal of Network Security. ,vol. 1, pp. 84- 102 ,(2005) , 10.6633/IJNS.200509.1(2).05
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Vitaly Shmatikov, Ming-Hsiu Wang, Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses Computer Security – ESORICS 2006. pp. 18- 33 ,(2006) , 10.1007/11863908_2
Felix Freiling, Ernst Biersack, Moritz Steiner, Frederic Dahl, Thorsten Holz, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. pp. 9- ,(2008)
George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnović, A model of the spread of randomly scanning Internet worms that saturate access links ACM Transactions on Modeling and Computer Simulation. ,vol. 18, pp. 1- 14 ,(2008) , 10.1145/1346325.1346327
Marc Rennhard, Bernhard Plattner, Introducing MorphMix Proceeding of the ACM workshop on Privacy in the Electronic Society - WPES '02. pp. 91- 102 ,(2002) , 10.1145/644527.644537
David Moore, Colleen Shannon, k claffy, Code-Red: a case study on the spread and victims of an internet worm acm special interest group on data communication. pp. 273- 284 ,(2002) , 10.1145/637201.637244
David L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms Communications of The ACM. ,vol. 24, pp. 84- 90 ,(1981) , 10.1145/358549.358563
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin, How much anonymity does network latency leak computer and communications security. pp. 82- 91 ,(2007) , 10.1145/1315245.1315257