Skip Nav Destination
ASME Press Select Proceedings
International Conference on Information Technology and Computer Science, 3rd (ITCS 2011)
Editor
V. E. Muhin ,
V. E. Muhin
National Technical University of Ukraine
Search for other works by this author on:
ISBN:
9780791859742
No. of Pages:
656
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
39 Research of the P2P Worm Defense Mechanism Based on Trust Mechanism
By
Hao Xiong
,
Hao Xiong
Computer School,
Huangshi Institute of Technology
; xh08108@163.com
Search for other works by this author on:
Zhihong Wang
Zhihong Wang
Art School,
Huangshi Institute of Technology
; wangzhihongxh@163.com
Search for other works by this author on:
Page Count:
4
-
Published:2011
Citation
Xiong, H, & Wang, Z. "Research of the P2P Worm Defense Mechanism Based on Trust Mechanism." International Conference on Information Technology and Computer Science, 3rd (ITCS 2011). Ed. Muhin, VE, & Hu, WB. ASME Press, 2011.
Download citation file:
P2P worm can destroy the entire P2P network in a short time, which turns out to be the biggest security threat of P2P application. In this paper, node trust mechanism is proposed that in-depth exchange of information becomes possible only when the rust between P2P nodes reaches the required threshold so that the P2P worms fast spread can be effectively curbed and the anti-virus system can have sufficient time to find and remove worm viruses. The simulation results show that this mechanism can effectively protect the network against P2P worms attack.
Abstract
Keywords
Introduction
The Definition of P2P Worm
P2P Worms' Main Ways of Spreading and Attack There Are Two Main Ways of Spreading
Trust Mechanism Based on P2P Worm Defense Strategy
Simulation
Conclusion
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Design of Defense-in-Depth Architecture of Web System Security Based on Seam
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
Effects of Aeration on Corrosiveness of Wet Residential Building Thermal Insulation on Low Carbon Steel
Insulation Materials: Testing and Applications, 2nd Volume
Design and Implementation of a Defense Mechanism for SQL Injection Attack
International Conference on Advanced Computer Theory and Engineering (ICACTE 2009)
Network Defense Efficiency Metric Model Based on Analytic Hierarchy Processing
International Conference on Computer Technology and Development, 3rd (ICCTD 2011)
Related Articles
A Game-Theoretic Approach for Defending Cyber-Physical Systems From Observability Attacks
ASME J. Risk Uncertainty Part B (June,2020)
Calculating Risks
Mechanical Engineering (January,2005)
The Need for Integrated Cybersecurity and Safety Training
ASME J of Nuclear Rad Sci (October,2018)