A Novel Application of the P2P Technology for Intrusion Detection

A Novel Application of the P2P Technology for Intrusion Detection

Zoltán Czirkos, Gábor Hosszú
ISBN13: 9781605660608|ISBN10: 1605660604|EISBN13: 9781605660615
DOI: 10.4018/978-1-60566-060-8.ch196
Cite Chapter Cite Chapter

MLA

Czirkos, Zoltán, and Gábor Hosszú. "A Novel Application of the P2P Technology for Intrusion Detection." Software Applications: Concepts, Methodologies, Tools, and Applications, edited by Pierre F. Tiako, IGI Global, 2009, pp. 3391-3398. https://doi.org/10.4018/978-1-60566-060-8.ch196

APA

Czirkos, Z. & Hosszú, G. (2009). A Novel Application of the P2P Technology for Intrusion Detection. In P. Tiako (Ed.), Software Applications: Concepts, Methodologies, Tools, and Applications (pp. 3391-3398). IGI Global. https://doi.org/10.4018/978-1-60566-060-8.ch196

Chicago

Czirkos, Zoltán, and Gábor Hosszú. "A Novel Application of the P2P Technology for Intrusion Detection." In Software Applications: Concepts, Methodologies, Tools, and Applications, edited by Pierre F. Tiako, 3391-3398. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-060-8.ch196

Export Reference

Mendeley
Favorite

Abstract

The importance of the network security problems come into prominence by the growth of the Internet. This article presents a new kind of software that uses the network itself to protect the hosts and increase their security. The hosts running this software create an application level network (ALN) over the Internet (Hosszú, 2005). Nodes connected to this ALN check their operating systems’ log files to detect intrusion attempts. Information collected this way is then shared over the ALN to increase the security of all peers, which can then make the necessary protection steps, for example, blocking network traffic by their own firewall. Different kinds of security software utilizing the network were also written previously (Snort, 2006). The novelty of Komondor is that its client software entities running in each host create a peer-to-peer (P2P) overlay network (Czirkos, 2006). Organization is automatic; it requires no user interaction. This network model ensures stability, which is important for quick and reliable communication between nodes. By this buildup, the system remains useful over the unstable network.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.