IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Novel Application of the P2P Technology for Intrusion Detection

A Novel Application of the P2P Technology for Intrusion Detection
View Sample PDF
Author(s): Zoltán Czirkos (Budapest University of Technology and Economics, Hungary)and Gábor Hosszú (Budapest University of Technology and Economics, Hungary)
Copyright: 2009
Pages: 6
Source title: Encyclopedia of Information Communication Technology
Source Author(s)/Editor(s): Antonio Cartelli (University of Cassino and Southern Lazio, Italy)and Marco Palma (University of Cassino, Italy)
DOI: 10.4018/978-1-59904-845-1.ch081

Purchase

View A Novel Application of the P2P Technology for Intrusion Detection on the publisher's website for pricing and purchasing information.

Abstract

The importance of the network security problems come into prominence by the growth of the Internet. This article presents a new kind of software that uses the network itself to protect the hosts and increase their security. The hosts running this software create an application level network (ALN) over the Internet (Hosszú, 2005). Nodes connected to this ALN check their operating systems’ log files to detect intrusion attempts. Information collected this way is then shared over the ALN to increase the security of all peers, which can then make the necessary protection steps, for example, blocking network traffic by their own firewall. Different kinds of security software utilizing the network were also written previously (Snort, 2006). The novelty of Komondor is that its client software entities running in each host create a peer-to-peer (P2P) overlay network (Czirkos, 2006). Organization is automatic; it requires no user interaction. This network model ensures stability, which is important for quick and reliable communication between nodes. By this build-up, the system remains useful over the unstable network.

Related Content

Tereza Raquel Merlo, Nayana Madali M. Pampapura, Jason M. Merlo. © 2024. 14 pages.
Kris Swen Helge. © 2024. 9 pages.
Ahmad Tasnim Siddiqui, Gulshaira Banu Jahangeer, Amjath Fareeth Basha. © 2024. 12 pages.
Jennie Lee Khun. © 2024. 19 pages.
Tereza Raquel Merlo. © 2024. 19 pages.
Akash Bag, Paridhi Sharma, Pranjal Khare, Souvik Roy. © 2024. 31 pages.
Akash Bag, Upasana Khattri, Aditya Agrawal, Souvik Roy. © 2024. 28 pages.
Body Bottom