Application of the P2P Model for Adaptive Host Protection

Application of the P2P Model for Adaptive Host Protection

Zoltán Czirkos
ISBN13: 9781605660141|ISBN10: 1605660140|EISBN13: 9781605660158
DOI: 10.4018/978-1-60566-014-1.ch008
Cite Chapter Cite Chapter

MLA

Czirkos, Zoltán. "Application of the P2P Model for Adaptive Host Protection." Encyclopedia of Multimedia Technology and Networking, Second Edition, edited by Margherita Pagani, IGI Global, 2009, pp. 54-60. https://doi.org/10.4018/978-1-60566-014-1.ch008

APA

Czirkos, Z. (2009). Application of the P2P Model for Adaptive Host Protection. In M. Pagani (Ed.), Encyclopedia of Multimedia Technology and Networking, Second Edition (pp. 54-60). IGI Global. https://doi.org/10.4018/978-1-60566-014-1.ch008

Chicago

Czirkos, Zoltán. "Application of the P2P Model for Adaptive Host Protection." In Encyclopedia of Multimedia Technology and Networking, Second Edition, edited by Margherita Pagani, 54-60. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-014-1.ch008

Export Reference

Mendeley
Favorite

Abstract

The importance of the network security problems comes into prominence by the growth of the Internet. This article introduces the basics of the host security problem, reviews the most important intrusion detection methods, and finally proposes a novel solution. Different kinds of security software utilizing the network have been described (Snort, 2006). The novelty of the proposed method is that its clients running in each host create a peer-to-peer (P2P) overlay network. Organization is automatic; it requires no user interaction. This network model ensures stability, which is important for quick and reliable communication between nodes. Its main idea is that the network that is the easiest way to attack the networked computers is utilized in the novel approach in order to improve the efficiency of the protection. By this build-up the system remains useful over the unstable network. The first implementation of the proposed method has proved its ability to protect operating systems of networked hosts.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.