A cooperation network model for secure management in dynamic P2P flow

被引:0
|
作者
Moon, Yong-Hyuk
Nah, Jae-Hoon
Jang, Jong-Soo
Youn, Chan-Hyun
机构
关键词
P2P traffic detection; identification P2P application; P2P network security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper discusses how to identify Peer-to-Peer (P2P) traffic using a blind technique without observing individual payload in the proposed cooperation network model. Traditionally, the payload inspection based traffic identification methodologies have been studied and developed for static internet traffic generated by well-known network applications such as http, ftp, telnet, smtp, etc. However, this approach is inadequate any more to detect and control newly emerging applications using P2P-like or P2P-based communication protocol. Also it strongly depends on the central intrusion detection system or firewall because signature as the prior-knowledge is normally built on that kind of systems. That fact derives three issues: performance overhead, central point of failure, and abnormality handling of traffic. Therefore, we propose the distributed detector strategy using tight cooperation between flow agent and secure gateway for indentifying the dynamic P2P traffic, even encrypted.
引用
收藏
页码:1176 / 1181
页数:6
相关论文
共 50 条
  • [1] Secure and Scalable Trust Management Model for IoT P2P Network
    Frahat, Rzan Tarig
    Monowar, Muhammed Mostafa
    Buhari, Seyed M.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [2] Dynamic secure trust management model for P2P e-commerce environments
    Li, Zhi-Yuan
    Wang, Ru-Chuan
    Tongxin Xuebao/Journal on Communications, 2011, 32 (03): : 50 - 59
  • [3] A novel dynamic trust model for P2P network
    Jian, Liao
    Zhi, Li
    Open Automation and Control Systems Journal, 2015, 7 (01): : 893 - 901
  • [4] A Flow Oriented Billing Model for Mobile P2P Network
    Hong, Yuanyuan
    Chen, Hui
    Pi, Renjie
    Wang, Xiaohui
    Li, Yan
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 903 - 907
  • [5] A P2P flow Identification Model Based On Bayesian Network
    Jin Fenglin
    Duan Yifeng
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [6] Model of Secure P2P Mobile Instant Messaging Based On Virtual Network
    Wanda, Putra
    Selo
    Hantono, Bimo Sunafri
    2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2014, : 81 - 85
  • [7] STORM: A secure overlay for P2P reputation management
    Ravoaja, Aina
    Anceaume, Emmanuelle
    FIRST IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS, 2007, : 247 - +
  • [8] Modeling cooperation in P2P data management systems
    Caroprese, Luciano
    Zumpano, Ester
    FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2008, 4994 : 225 - 235
  • [9] Dynamic Model of Growing File-Sharing P2P Network
    Kononova, A. I.
    Gagarina, L. G.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (07) : 645 - 651
  • [10] Dynamic Model of Growing File-Sharing P2P Network
    A. I. Kononova
    L. G. Gagarina
    Automatic Control and Computer Sciences, 2020, 54 : 645 - 651