Image and video Authentication
for P2P application
Due to
an active agent can be designed to perform
several tasks, we will also design active agents to perform
different tasks like data authentication, copyright protection,
and covert communication (steganography).
Security knowledge warehousing
for P2P intrusion detection and prevention
Security knowledge including attack features and detection
methods are evolutional in a rapidly changing network
environment. Main research tasks about application-level
network security include: (i) dynamic security knowledge
acquisition method; (ii) security knowledge warehousing;
(iii) knowledge aggregation and generalization techniques;
(iv) worm immune service; and (v) the improvement of misuse
intrusion detector's power and efficiency.
We detect a P2P flow and packets sent from a P2P
connection, such as eDonkey, eMule, Kademlia, KaZaA, BT, and
Gnutella SoulSeek, by using content-based algorithm. The
test system is now implemented in Intel IXDP425 embedded
system.
|