A Novel Application of the P2P Technology for Intrusion Detection

A Novel Application of the P2P Technology for Intrusion Detection

Zoltán Czirkos, Gábor Hosszú
Copyright: © 2009 |Pages: 6
ISBN13: 9781599048451|ISBN10: 1599048450|EISBN13: 9781599048468
DOI: 10.4018/978-1-59904-845-1.ch081
Cite Chapter Cite Chapter

MLA

Czirkos, Zoltán, and Gábor Hosszú. "A Novel Application of the P2P Technology for Intrusion Detection." Encyclopedia of Information Communication Technology, edited by Antonio Cartelli and Marco Palma, IGI Global, 2009, pp. 616-621. https://doi.org/10.4018/978-1-59904-845-1.ch081

APA

Czirkos, Z. & Hosszú, G. (2009). A Novel Application of the P2P Technology for Intrusion Detection. In A. Cartelli & M. Palma (Eds.), Encyclopedia of Information Communication Technology (pp. 616-621). IGI Global. https://doi.org/10.4018/978-1-59904-845-1.ch081

Chicago

Czirkos, Zoltán, and Gábor Hosszú. "A Novel Application of the P2P Technology for Intrusion Detection." In Encyclopedia of Information Communication Technology, edited by Antonio Cartelli and Marco Palma, 616-621. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-59904-845-1.ch081

Export Reference

Mendeley
Favorite

Abstract

The importance of the network security problems come into prominence by the growth of the Internet. This article presents a new kind of software that uses the network itself to protect the hosts and increase their security. The hosts running this software create an application level network (ALN) over the Internet (Hosszú, 2005). Nodes connected to this ALN check their operating systems’ log files to detect intrusion attempts. Information collected this way is then shared over the ALN to increase the security of all peers, which can then make the necessary protection steps, for example, blocking network traffic by their own firewall. Different kinds of security software utilizing the network were also written previously (Snort, 2006). The novelty of Komondor is that its client software entities running in each host create a peer-to-peer (P2P) overlay network (Czirkos, 2006). Organization is automatic; it requires no user interaction. This network model ensures stability, which is important for quick and reliable communication between nodes. By this build-up, the system remains useful over the unstable network.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.