Title
Methodology for detection and restraint of p2p applications in the network
Abstract
P2P networks are consuming more and more Internet resources, it is estimated that approximately 70% of all Internet carried traffic is composed by packets from these networks. Moreover, they still represent the main infection vector for various types of malware and can be used as command and control channel for P2P botnets, besides being famous for being notoriously used to distribute a range of pirated files (movies, music, games,...). In this paper we present some typical characteristics of P2P networks and propose a new architecture based on filters to detect hosts running P2P applications. We also provide a methodology on how to prevent the communication of those hosts in order to avoid undesirable impacts in the operation of the network as a whole.
Year
DOI
Venue
2012
10.1007/978-3-642-31128-4_24
ICCSA (4)
Keywords
Field
DocType
main infection vector,various type,p2p application,p2p network,internet resource,new architecture,p2p botnets,control channel,undesirable impact,typical characteristic
Architecture,Port (computer networking),Computer science,Command and control,Botnet,Network packet,Computer network,Communication channel,Malware,The Internet
Conference
Volume
ISSN
Citations 
7336
0302-9743
0
PageRank 
References 
Authors
0.34
14
2
Name
Order
Citations
PageRank
Rodrigo M. P. Silva1351.68
Ronaldo M. Salles213412.14