Simulation result and LAN-environment experiment result both indicate that PWD is an effective method to detect and block P2P worms. Article PDF ...
Abstract. P2P worm exploits common vulnerabilities and spreads through peer-to-peer networks. Despite being rec- ognized as a potential and deadly threat to ...
P2P worm detection based on application identification | Semantic ...
www.semanticscholar.org › paper
This paper investigates a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network and extracts ...
In addition, this method can also detect unknown P2P worms based on behavior. This method is mainly composed of the technology of application identification ...
Simulation result and LAN-environment experiment result both indicate that PWD is an effective method to detect and block P2P worms. Full Text.
Simulation result and LAN-environment experiment result both indicate that PWD is an effective method to detect and block P2P worms. References 15. Citations 3.
We propose a host-based, runtime defense against worms that leverages peer-to-peer (P2P) cooperation to lower its risk of false positives. We claim that, by ...
Jul 19, 2023 · This worm is capable of cross-platform infections and targets Redis, a popular open-source database application that is heavily used within cloud environments.
People also ask
How do worms use P2P applications?
How do I test my P2P connection?
... P2P worm detection (PWD) based on the worm's propagation characteristics. PWD consists of a preprocess procedure which is based on application identification ...
A Signature-Behavior-Based P2P Worm Detection Approach ...
www.researchgate.net › publication › 22...
In addition, this method can also detect unknown P2P worms based on behavior. This method is mainly composed of the technology of application identification, ...