Skip to main content

A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms

  • Conference paper
Information Security and Cryptology (Inscrypt 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6151))

Included in the following conference series:

  • 868 Accesses

Abstract

Peer-to-peer (P2P) file-sharing worms are becoming a deadly security threat to P2P systems. The defense that just relies on the improvement of users’ security awareness and their individual recoveries is not adequate. Existing automated patching systems such as Microsoft Windows Update and Symantec Security Update are also not necessarily the best fits in combat with P2P file-sharing worms, because of the inconsistency between the jurisdiction of these patching systems and the propagation community of P2P file-sharing worms. In this paper, with a deep understanding of the propagation characteristic of P2P file-sharing worms and the inspiration of more rapid contagion worms, we propose a complementary contagion-like patch dissemination mechanism which utilizes the existing file-sharing infrastructure to timely disseminate security patches between the participating peers of the file downloading. In addition, the digital signature scheme is introduced to prevent malicious peers tampering with patches in the dissemination process. Through the epidemiological model and extensive packet-level simulations we demonstrate the effectiveness of the proposed patch dissemination mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sandvine Incorporated ULC. 2008 Analysis of Traffic Demographics in North-American Broadband Networks (June 2008), http://www.sandvine.com/general/documents/Traffic_Demographics_NA_Broadband_Networks.pdf

  2. http://www.viruslist.com/en/virusesdescribed?chapter=153311928

  3. Shin, S., Jung, J., Balakrishnan, H.: Malware Prevalence in the KaZaA File-Sharing Network. In: 6th ACM SIGCOMM Internet Measurement Conference, pp. 333–338. ACM Press, New York (2006)

    Google Scholar 

  4. Xie, L., Song, H., Zhu, S.: On the Effectiveness of Internal Patching Against File-Sharing Worms. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 1–20. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Brumley, D., Liu, L., Poosankam, P., Song, D.: Design Space and Analysis of Worm Defense Strategies. In: ACM Symposium on Information, Computer and Communication Security, pp. 125–137. ACM Press, New York (2006)

    Google Scholar 

  6. Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: 11th USENIX Security Symposium, pp. 149–167. USENIX Association, Berkeley (2002)

    Google Scholar 

  7. Thommes, R., Coates, M.: Epidemiological Modeling of Peer-to-Peer Viruses and Pollution. In: IEEE INFOCOM 2006, pp. 1–12. IEEE Press, Piscataway (2006)

    Chapter  Google Scholar 

  8. Stutzbach, D., Zhao, S., Rejaie, R.: Characterizing Files in the Modern Gnutella Network: A Measurement Study. Multimedia Systems 13, 35–50 (2007)

    Article  Google Scholar 

  9. Stutzbach, D., Rejaie, R., Sen, S.: Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems. IEEE/ACM Transactions on Networking 16, 267–280 (2008)

    Article  Google Scholar 

  10. Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload. In: 19th ACM Symposium on Operating System Principles, pp. 314–329. ACM Press, New York (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nie, X., Jing, J., Wang, Y. (2010). A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds) Information Security and Cryptology. Inscrypt 2009. Lecture Notes in Computer Science, vol 6151. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16342-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16342-5_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16341-8

  • Online ISBN: 978-3-642-16342-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics