The Komondor Peer to Peer Security System
draft-czirkos-komondor-p2p-security-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Gabor Hosszu , Zoltan Czirkos | ||
Last updated | 2007-12-04 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This memo presents Komondor, an experimental peer-to-peer security system. Komondor is a network intrusion detection system. Hosts running this software organize themselves automatically in an overlay network, where they share information about intrusion attempts they detect. This way the security of all participants is increased, as they are able to prepare for some of the attacks in advance. The overlay created is a peer-to-peer network, which is completely decentralized. This communication model ensures stability, and by using this the system remains operational over an unstable network.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)