Skip to main content
Top
Published in: Cluster Computing 5/2019

11-01-2018

Soft computing approach based malicious peers detection using geometric and trust features in P2P networks

Authors: T. Premakumari, M. Chandrasekaran

Published in: Cluster Computing | Special Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The attacks in P2P networks can be classified into two types: passive and active attacks. Passive attacks refer to the attempts made by malicious nodes to perceive the activities, whereas the active attacks are attacks performed by the malicious nodes that bear some energy cost to perform the attack. Malicious peer detection in P2P networks is a complication task due to the similar characteristics between trusty peer and malicious peer. This paper focuses the malicious peer detection system using feed forward back propagation neural networks. The characteristic features such as Geometric and Trust features are extracted from the peers in P2P networks and these extracted features are trained and classified using neural networks. The performance of the proposed malicious peer detection system is analyzed in terms of latency and detection rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ren, S., Guo, L., Zhang, X.: ASAP: An AS-aware peer-relay protocol for high quality VoIP. In: proceedings of IEEE International Conference on Distributed Computing Systems, pp. 70–79 (2006) Ren, S., Guo, L., Zhang, X.: ASAP: An AS-aware peer-relay protocol for high quality VoIP. In: proceedings of IEEE International Conference on Distributed Computing Systems, pp. 70–79 (2006)
2.
go back to reference Gummadi, K., Gummadi, R., Gribble, S., Ratnasamy, S., Shenker, S., Stoica, I.: The impact of DHT routing geometry on resilience and proximity. In: Proceedings of ACM SIGCOMM, (2003) Gummadi, K., Gummadi, R., Gribble, S., Ratnasamy, S., Shenker, S., Stoica, I.: The impact of DHT routing geometry on resilience and proximity. In: Proceedings of ACM SIGCOMM, (2003)
3.
go back to reference Francis, P., Jami, S., Jin, C., Jin, Y., Raz, D., Shavitt, Y., Zhang, L.: IDMaps: a global internet host distance estimation service. In: Proceedings of the IEEE/ACM Transactions on Networking, (2001) Francis, P., Jami, S., Jin, C., Jin, Y., Raz, D., Shavitt, Y., Zhang, L.: IDMaps: a global internet host distance estimation service. In: Proceedings of the IEEE/ACM Transactions on Networking, (2001)
5.
go back to reference Lei, J., Shi, L., Fu, X.: An experimental analysis of Joost peer-topeer VoD service. GeorgAugust-Universität Göttingen, Technischer Bericht des Instituts für Informatik (2007) Lei, J., Shi, L., Fu, X.: An experimental analysis of Joost peer-topeer VoD service. GeorgAugust-Universität Göttingen, Technischer Bericht des Instituts für Informatik (2007)
6.
go back to reference Sun, Q., Garcia-Molina, H.: Partial lookup services. In: Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS) (2003) Sun, Q., Garcia-Molina, H.: Partial lookup services. In: Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS) (2003)
7.
go back to reference Yang, B., Garcia-Molina, H.: Improving efficiency of peer-to-peer search. In: Proceedings of the of the 28th International Conference on istributed Computing Systems, (2002) Yang, B., Garcia-Molina, H.: Improving efficiency of peer-to-peer search. In: Proceedings of the of the 28th International Conference on istributed Computing Systems, (2002)
8.
go back to reference Wang, C.-C., Lin, Y.-D.: CDNPatch: a cost-effective failover mechanism for hybrid CDN-P2P live streaming systems. Int. J. Commun. Syst. 29(17), 2517–2533 (2016)CrossRef Wang, C.-C., Lin, Y.-D.: CDNPatch: a cost-effective failover mechanism for hybrid CDN-P2P live streaming systems. Int. J. Commun. Syst. 29(17), 2517–2533 (2016)CrossRef
9.
go back to reference Shen, H., Lin, Y., Li, J.: A social-network-aided efficient peer-to-peer live streaming system. IEEE/ACM Transact. Netw. 23(3), 987–1000 (2015)CrossRef Shen, H., Lin, Y., Li, J.: A social-network-aided efficient peer-to-peer live streaming system. IEEE/ACM Transact. Netw. 23(3), 987–1000 (2015)CrossRef
10.
go back to reference Zhang, J., Yang, C., Zhang, X.: A high-bandwidth live streaming model in mesh-based Peer-to-Peer networks. IEEE Commun. Lett. 20(12), 2390–2393 (2016)CrossRef Zhang, J., Yang, C., Zhang, X.: A high-bandwidth live streaming model in mesh-based Peer-to-Peer networks. IEEE Commun. Lett. 20(12), 2390–2393 (2016)CrossRef
11.
go back to reference Zaitsev, D.A., Shmeleva, T.R., Retschitzegger, W., Pröll, B.: Security of grid structures under disguised traffic attacks. Clust. Comput. 19(3), 1183–1200 (2016)CrossRef Zaitsev, D.A., Shmeleva, T.R., Retschitzegger, W., Pröll, B.: Security of grid structures under disguised traffic attacks. Clust. Comput. 19(3), 1183–1200 (2016)CrossRef
12.
go back to reference Efthymiopoulos, N., Christakidis, A., Efthymiopoulou, M., Corazza, L., Denazis, S.: Congestion control for P2P live streaming. Int. J. Peer Peer Netw. 6(2), 21 (2015) Efthymiopoulos, N., Christakidis, A., Efthymiopoulou, M., Corazza, L., Denazis, S.: Congestion control for P2P live streaming. Int. J. Peer Peer Netw. 6(2), 21 (2015)
Metadata
Title
Soft computing approach based malicious peers detection using geometric and trust features in P2P networks
Authors
T. Premakumari
M. Chandrasekaran
Publication date
11-01-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 5/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1588-7

Other articles of this Special Issue 5/2019

Cluster Computing 5/2019 Go to the issue

Premium Partner