Abstract
Peer-to-peer (P2P) file-sharing worms are becoming a deadly security threat to P2P systems. The defense that just relies on the improvement of users’ security awareness and their individual recoveries is not adequate. Existing automated patching systems such as Microsoft Windows Update and Symantec Security Update are also not necessarily the best fits in combat with P2P file-sharing worms, because of the inconsistency between the jurisdiction of these patching systems and the propagation community of P2P file-sharing worms. In this paper, with a deep understanding of the propagation characteristic of P2P file-sharing worms and the inspiration of more rapid contagion worms, we propose a complementary contagion-like patch dissemination mechanism which utilizes the existing file-sharing infrastructure to timely disseminate security patches between the participating peers of the file downloading. In addition, the digital signature scheme is introduced to prevent malicious peers tampering with patches in the dissemination process. Through the epidemiological model and extensive packet-level simulations we demonstrate the effectiveness of the proposed patch dissemination mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sandvine Incorporated ULC. 2008 Analysis of Traffic Demographics in North-American Broadband Networks (June 2008), http://www.sandvine.com/general/documents/Traffic_Demographics_NA_Broadband_Networks.pdf
http://www.viruslist.com/en/virusesdescribed?chapter=153311928
Shin, S., Jung, J., Balakrishnan, H.: Malware Prevalence in the KaZaA File-Sharing Network. In: 6th ACM SIGCOMM Internet Measurement Conference, pp. 333–338. ACM Press, New York (2006)
Xie, L., Song, H., Zhu, S.: On the Effectiveness of Internal Patching Against File-Sharing Worms. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 1–20. Springer, Heidelberg (2008)
Brumley, D., Liu, L., Poosankam, P., Song, D.: Design Space and Analysis of Worm Defense Strategies. In: ACM Symposium on Information, Computer and Communication Security, pp. 125–137. ACM Press, New York (2006)
Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: 11th USENIX Security Symposium, pp. 149–167. USENIX Association, Berkeley (2002)
Thommes, R., Coates, M.: Epidemiological Modeling of Peer-to-Peer Viruses and Pollution. In: IEEE INFOCOM 2006, pp. 1–12. IEEE Press, Piscataway (2006)
Stutzbach, D., Zhao, S., Rejaie, R.: Characterizing Files in the Modern Gnutella Network: A Measurement Study. Multimedia Systems 13, 35–50 (2007)
Stutzbach, D., Rejaie, R., Sen, S.: Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems. IEEE/ACM Transactions on Networking 16, 267–280 (2008)
Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. In: 19th ACM Symposium on Operating System Principles, pp. 314–329. ACM Press, New York (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nie, X., Jing, J., Wang, Y. (2010). A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds) Information Security and Cryptology. Inscrypt 2009. Lecture Notes in Computer Science, vol 6151. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16342-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-16342-5_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16341-8
Online ISBN: 978-3-642-16342-5
eBook Packages: Computer ScienceComputer Science (R0)