Predators: good will mobile codes combat against computer viruses
Proceedings of the 2002 workshop on New security paradigms
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Vigilante: end-to-end containment of internet worms
Proceedings of the twentieth ACM symposium on Operating systems principles
On the effectiveness of automatic patching
Proceedings of the 2005 ACM workshop on Rapid malcode
Peer to peer networks for defense against internet worms
Interperf '06 Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems
Dependency-aware maintenance for highly available service-oriented grid
Journal of Systems and Software
Hi-index | 0.00 |
In this project we design and implement a security-update propagation network that employs peer-to-peer model, where computers act as equals and all hosts participate in providing security update services. When a computer node joins the network to download new security updates it is automatically enlisted to serve other computers with older updates. Hence, as network size becomes larger its capability to provide service will increase and performance balances very well. To protect the network against malicious computers that may join in to spread infected files, we employ digital signature to verify the validity of any download and identify infected nodes. In addition, we incorporate other features in our network such as: the support for multiple platforms, automation, new update notification, and software update.