A cooperation network model for secure management in dynamic P2P flow

被引:0
|
作者
Moon, Yong-Hyuk
Nah, Jae-Hoon
Jang, Jong-Soo
Youn, Chan-Hyun
机构
关键词
P2P traffic detection; identification P2P application; P2P network security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper discusses how to identify Peer-to-Peer (P2P) traffic using a blind technique without observing individual payload in the proposed cooperation network model. Traditionally, the payload inspection based traffic identification methodologies have been studied and developed for static internet traffic generated by well-known network applications such as http, ftp, telnet, smtp, etc. However, this approach is inadequate any more to detect and control newly emerging applications using P2P-like or P2P-based communication protocol. Also it strongly depends on the central intrusion detection system or firewall because signature as the prior-knowledge is normally built on that kind of systems. That fact derives three issues: performance overhead, central point of failure, and abnormality handling of traffic. Therefore, we propose the distributed detector strategy using tight cooperation between flow agent and secure gateway for indentifying the dynamic P2P traffic, even encrypted.
引用
收藏
页码:1176 / 1181
页数:6
相关论文
共 50 条
  • [21] Secure Model for P2P File-Sharing System
    Raj, S. Vishnu
    Indhumathi, Govindaswamy
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 239 - 251
  • [22] Evaluating the dynamic behaviour of PROSA P2P network
    Carchiolo, Vincenza
    Malgeri, Michele
    Mangioni, Giuseppe
    Nicosia, Vincenzo
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2006, 4330 : 904 - +
  • [23] Ecological network-inspired trust management model of P2P networks
    Liu, Fengming
    Ding, Yongsheng
    SECOND WORKSHOP ON DIGITAL MEDIA AND ITS APPLICATION IN MUSEUM & HERITAGE, PROCEEDINGS, 2007, : 297 - 302
  • [24] Towards secure P2P network: Degenerated node identification and evaluation
    Zhang, Liumei
    Ma, Jianfeng
    Wang, Yichuan
    Lu, Di
    Zhang, Liumei (rikrun@gmail.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (08): : 371 - 377
  • [25] A Secure Communication Mechanism of P2P RFID Code Resolution Network
    Liu Xueyang
    Zhao Wen
    Huang Kaimu
    Feng Zhiming
    Zhang Shikun
    Wang Lifu
    CHINESE JOURNAL OF ELECTRONICS, 2010, 19 (04): : 621 - 626
  • [26] A secure Hybrid P2P Network mobile communication device design
    Kuo, Wen-Hsiung
    Su, Pin-Chiang
    Lu, Jiang-Lung
    APPLIED SCIENCE AND PRECISION ENGINEERING INNOVATION, PTS 1 AND 2, 2014, 479-480 : 968 - +
  • [27] A secure P2P file sharing model using trust management and data integrity verification
    Senthil Madasamy N.
    Revathi T.
    Senthil Madasamy, N. (senthilmadasamy90@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 335 - 344
  • [28] The incentive secure mechanism based on quality of service in P2P network
    Liu, Yuhua
    Li, Yuling
    Xiong, Naixue
    Park, Jong Hyuk
    Lee, Yang Sun
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 224 - 233
  • [29] A Scheme of Trust Management System for P2P Network
    BinbinLiang
    LizeGu
    Sun, Bin
    Yang, Yixian
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1453 - 1458
  • [30] On Network Management Solutions and the Potential of P2P Technologies
    Xu, Hui
    Xiao, Debao
    Chang, Yanan
    Peng, X.
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 401 - 404