Methodology for detection and restraint of P2P applications in the network

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

P2P networks are consuming more and more Internet resources, it is estimated that approximately 70% of all Internet carried traffic is composed by packets from these networks. Moreover, they still represent the main infection vector for various types of malware and can be used as command and control channel for P2P botnets, besides being famous for being notoriously used to distribute a range of pirated files (movies, music, games,...). In this paper we present some typical characteristics of P2P networks and propose a new architecture based on filters to detect hosts running P2P applications. We also provide a methodology on how to prevent the communication of those hosts in order to avoid undesirable impacts in the operation of the network as a whole. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Silva, R. M. P., & Salles, R. M. (2012). Methodology for detection and restraint of P2P applications in the network. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7336 LNCS, pp. 326–339). https://doi.org/10.1007/978-3-642-31128-4_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free