A security monitoring method for malicious P2P event detection

8Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently malicious code is spreading rapidly due to the use of P2P(peer to peer) file sharing. The malicious code distributed mostly transformed the infected PC as a botnet for various attacks by attackers. This can take important information from the computer and cause a large-scale DDos attack. Therefore it is extremely important to detect and block the malicious code in early stage. However a centralized security monitoring system widely used today cannot detect a sharing file on a P2P network. In this paper, to compensate the defect, P2P file sharing events are obtained and the behavior is analyzed. Based on the analysis a malicious file detecting system is proposed and synchronized with a security monitoring system on a virtual machine. In application result, it has been detected such as botnet malware using P2P. It is improved by 12 % performance than existing security monitoring system. The proposed system can detect suspicious P2P sharing files that were not possible by an existing system. The characteristics can be applied for security monitoring to block and respond to the distribution of malicious code through P2P.

Cite

CITATION STYLE

APA

Jung, H. M., Hwang, I. S., Moon, J. K., & Park, H. S. (2016). A security monitoring method for malicious P2P event detection. Peer-to-Peer Networking and Applications, 9(3), 498–507. https://doi.org/10.1007/s12083-015-0369-4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free