2009 First International Workshop on Education Technology and Computer Science 2009
DOI: 10.1109/etcs.2009.661
|View full text |Cite
|
Sign up to set email alerts
|

Network-Based Detection Method against Proactive P2P Worms Leveraging Application-Level Knowledge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…With the development of the mobile network technology and the gradually mature of P2P network technology, the mobile P2P network combining with mobile computing and P2P technology is emerged [1]. Mobile P2P Network (Mobile Peer-to-Peer Network) is also called Mobile peer-to-peer Network, it is based on the Mobile wireless Network, the nodes in the Network is usually a Mobile phone, PDA and other Mobile devices, these devices have a certain particularity, such as small storage capacity, low processing power and limited Network bandwidth and limited battery energy, etc [2].…”
Section: Introductionmentioning
confidence: 99%
“…With the development of the mobile network technology and the gradually mature of P2P network technology, the mobile P2P network combining with mobile computing and P2P technology is emerged [1]. Mobile P2P Network (Mobile Peer-to-Peer Network) is also called Mobile peer-to-peer Network, it is based on the Mobile wireless Network, the nodes in the Network is usually a Mobile phone, PDA and other Mobile devices, these devices have a certain particularity, such as small storage capacity, low processing power and limited Network bandwidth and limited battery energy, etc [2].…”
Section: Introductionmentioning
confidence: 99%
“…Reactive P2P worms infect only peers which are requesting files at that time [7]. Active P2P worm has a non-scanning feature and can make use of neighbor routing table of P2P network as attacking list to launch an attack [8]. Although there are currently only passive P2P worms in the wild such as Igloo and MyDoom, active P2P worms will prevail in the future.…”
Section: Introductionmentioning
confidence: 99%