P2P networks are consuming more and more Internet resources, it is estimated that approximately 70% of all Internet carried traffic is composed by packets from these networks. Moreover, they still represent the main infection vector for various types of malware and can be used as command and control channel for P2P botnets, besides being famous for being notoriously used to distribute a range of pirated files (movies, music, games,...). In this paper we present some typical characteristics of P2P networks and propose a new architecture based on filters to detect hosts running P2P applications. We also provide a methodology on how to prevent the communication of those hosts in order to avoid undesirable impacts in the operation of the network as a whole. © 2012 Springer-Verlag.
CITATION STYLE
Silva, R. M. P., & Salles, R. M. (2012). Methodology for detection and restraint of P2P applications in the network. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7336 LNCS, pp. 326–339). https://doi.org/10.1007/978-3-642-31128-4_24
Mendeley helps you to discover research relevant for your work.