Towards Secure P2P Network: Degenerated Node Identification and Evaluation

نویسندگان

  • Liumei Zhang
  • Jianfeng Ma
  • Yichuan Wang
  • Di Lu
چکیده

The security improvement of service provided by peer-to-peer (P2P) network has been widely studied. Security issue of P2P is mainly related to the users of P2P services and threat of malicious software. Especially, some malicious software could threaten other P2P users and even threaten the security of the entire P2P network. In this paper, based on the analytical hierarchy process, a degenerated node evaluation model has been proposed to evaluate the node resource usage of the P2P. Moreover, an attribute clustering based collaborative filtering algorithm is depicted for calculating the similarities between the identified degenerated node and all other nodes within a hybrid autonomous cluster. The algorithm utilizes similarity characteristics of node task resource attributes, especially CPU related attributes, to filter redundant data by feature selection. Experiments show that, the proposed model and method is feasible and has the vital significance for providing decision support and recommendation to the search node. It is practical for secure computing of P2P network.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Special Section on Information and Communication System Security

1. Scope The major topics include, but are not limited to: ‐ Security Technologies on (Network, AdHoc Network, P2P, Sensor Network, RFID, Wireless Network, Mobile Network, Home Network, NGN, and Future Internet) ‐ Access Control, Content Security, DRM, CDN, Privacy Protection, E-Commerce, PKI, Security Architecture, Security Protocol, Security Implementation, Technologies, Secure OS, Security E...

متن کامل

Trust Based Reliable and Secure Routing in Peer-to-Peer Overlay Networks

Increasingly on the Internet, applications are supported by sets of loosely connected machines operating without any form of central coordination and more complex than classical distributed system. Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-topeer (P2P) content sharing, media streaming, ...

متن کامل

Gossip-Based Reputation Management for Unstructured Peer-to-Peer Networks*

To build an efficient reputation system for peer-to-peer (P2P) networks, we need fast mechanisms to aggregate peer evaluations and to disseminate updated scores to a large number of peer nodes. Unfortunately, unstructured P2P networks are short of secure hashing and fast lookup mechanisms as in structured P2P systems like the DHT-based Chord. In light of this shortcoming, we propose a gossiping...

متن کامل

Ring-Based P2P-VPN for Realizing Cybersociety

In this paper, we propose a ring-based P2P-VPN (Peer-to-Peer Virtual Private Network) that provides a secure and reliable network to a large number of virtual organizations. The ring-based P2P-VPN establishes VPN by logically connecting nodes that operate autonomously in a ring topology. The ring-based P2P-VPN has an advantage of a high scalability in terms of the number of VPNs accommodated. I...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015