Skip to main content
Log in

Soft computing approach based malicious peers detection using geometric and trust features in P2P networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The attacks in P2P networks can be classified into two types: passive and active attacks. Passive attacks refer to the attempts made by malicious nodes to perceive the activities, whereas the active attacks are attacks performed by the malicious nodes that bear some energy cost to perform the attack. Malicious peer detection in P2P networks is a complication task due to the similar characteristics between trusty peer and malicious peer. This paper focuses the malicious peer detection system using feed forward back propagation neural networks. The characteristic features such as Geometric and Trust features are extracted from the peers in P2P networks and these extracted features are trained and classified using neural networks. The performance of the proposed malicious peer detection system is analyzed in terms of latency and detection rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Ren, S., Guo, L., Zhang, X.: ASAP: An AS-aware peer-relay protocol for high quality VoIP. In: proceedings of IEEE International Conference on Distributed Computing Systems, pp. 70–79 (2006)

  2. Gummadi, K., Gummadi, R., Gribble, S., Ratnasamy, S., Shenker, S., Stoica, I.: The impact of DHT routing geometry on resilience and proximity. In: Proceedings of ACM SIGCOMM, (2003)

  3. Francis, P., Jami, S., Jin, C., Jin, Y., Raz, D., Shavitt, Y., Zhang, L.: IDMaps: a global internet host distance estimation service. In: Proceedings of the IEEE/ACM Transactions on Networking, (2001)

  4. Xie, H., Krishnamurthy, A., Silberschatz, A., Yang, Y.R.: P4P: explicit communications for cooperative control between P2P and network providers. http://www.dcia.info/documents/P4POverview.pdf

  5. Lei, J., Shi, L., Fu, X.: An experimental analysis of Joost peer-topeer VoD service. GeorgAugust-Universität Göttingen, Technischer Bericht des Instituts für Informatik (2007)

  6. Sun, Q., Garcia-Molina, H.: Partial lookup services. In: Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS) (2003)

  7. Yang, B., Garcia-Molina, H.: Improving efficiency of peer-to-peer search. In: Proceedings of the of the 28th International Conference on istributed Computing Systems, (2002)

  8. Wang, C.-C., Lin, Y.-D.: CDNPatch: a cost-effective failover mechanism for hybrid CDN-P2P live streaming systems. Int. J. Commun. Syst. 29(17), 2517–2533 (2016)

    Article  Google Scholar 

  9. Shen, H., Lin, Y., Li, J.: A social-network-aided efficient peer-to-peer live streaming system. IEEE/ACM Transact. Netw. 23(3), 987–1000 (2015)

    Article  Google Scholar 

  10. Zhang, J., Yang, C., Zhang, X.: A high-bandwidth live streaming model in mesh-based Peer-to-Peer networks. IEEE Commun. Lett. 20(12), 2390–2393 (2016)

    Article  Google Scholar 

  11. Zaitsev, D.A., Shmeleva, T.R., Retschitzegger, W., Pröll, B.: Security of grid structures under disguised traffic attacks. Clust. Comput. 19(3), 1183–1200 (2016)

    Article  Google Scholar 

  12. Efthymiopoulos, N., Christakidis, A., Efthymiopoulou, M., Corazza, L., Denazis, S.: Congestion control for P2P live streaming. Int. J. Peer Peer Netw. 6(2), 21 (2015)

    Google Scholar 

  13. Varatharajan, R., Manogaran, G., Priyan, M.K., Sundarasekar, R.: Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Clust. Comput. https://doi.org/10.1007/s10586-017-0977-2 (2017)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to T. Premakumari.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Premakumari, T., Chandrasekaran, M. Soft computing approach based malicious peers detection using geometric and trust features in P2P networks. Cluster Comput 22 (Suppl 5), 12227–12232 (2019). https://doi.org/10.1007/s10586-017-1588-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1588-7

Keywords

Navigation