Security Basics mailing list archives

security in P2P


From: Pratik Narang <pratik.cse.bits () gmail com>
Date: Fri, 27 Jul 2012 12:38:37 +0530

Hi all,

Consider a situation involving (only) Peer to Peer traffic in a small
or medium sized network.

Peer A does a search for file qwerty.mp3, and then starts pulling the
file, in pieces, from different Peers- B, C, D and E.

Now say Mr. C is a malicious peer, and the file at his end contains a
malware/virus/trojan etc. Or better still, Mr. C decides to target
peer A and injects a malware/trojan etc. into one of the pieces of the
file.

As a network admin, what one may do that innocent peers like A are
protected from such situations. I need a solution involving use of
IDS/IPS with signature based and/or anomaly based detection.

Kindly do not suggest actions or measures relating to the end user.
Whatever has to be done, must be done in the network design/plan- say
use Snort or some other IDS/IPS and write rules to an Open source
firewall using the IDS/IPS for this specific scenario.

------------------------------------------------------------------------
Securing Apache Web Server with thawte Digital Certificate
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.  We look at how SSL works, how 
it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, 
install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are 
highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.

http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
------------------------------------------------------------------------


Current thread: