CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Development of Collaborative Defensible Services based on P2P Systems

by Aarti.r, Aishwarya.m.j, Bhavana.b And Vanaja Gokul
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 20
Year of Publication: 2012
Authors: Aarti.r, Aishwarya.m.j, Bhavana.b And Vanaja Gokul
10.5120/7054-9345

Aarti.r, Aishwarya.m.j, Bhavana.b And Vanaja Gokul . Development of Collaborative Defensible Services based on P2P Systems. International Journal of Computer Applications. 46, 20 ( May 2012), 1-7. DOI=10.5120/7054-9345

@article{ 10.5120/7054-9345,
author = { Aarti.r, Aishwarya.m.j, Bhavana.b And Vanaja Gokul },
title = { Development of Collaborative Defensible Services based on P2P Systems },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 20 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number20/7054-9345/ },
doi = { 10.5120/7054-9345 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:40:13.348819+05:30
%A Aarti.r
%A Aishwarya.m.j
%A Bhavana.b And Vanaja Gokul
%T Development of Collaborative Defensible Services based on P2P Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 20
%P 1-7
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the immense development of computer networks, the network security problems have also developed simultaneously, causing severe damage, thus reducing the efficiency of the networks and also the nodes in the networks. Protection provided at the nodes is not sufficient to completely protect the node from external attacks, hence a collaborative approach, is used to solve the network security problems. This paper explains the implementation of collaborative network security platform based on a Peer-to-Peer (P2P) network. An experiment is demonstrated where-in a peer can download a required file from a central server; these files may contain malicious software that could affect the peer. The services required to deal with the malicious software is provided by another server.

References
  1. Kin-Wah Kwong and Danny H. K. Tsang,"Building Heterogenous Peer-to-Peer Networks: Protocol and Analysis", IEEE/ACM Transactions On Networking, Vol. 16, No. 2, April 2008
  2. Michael E. Locasto, Janak J. Parekh, Angelos D. Keromytis and Salvatore J. Stolfo,"TowardsCollaborative Security and P2P Intrusion Detection", Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC.
  3. Rocky K. C. Chang,"Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial", Communications Magazine, IEEE Vol. 40,pp. 42-51.
  4. Yu Chen, Member, Kai Hwang and Wei-Shinn Ku,"Collaborative Detection of DDoS Attacks over Multiple Network Domains" IEEE Transactions On Parallel and Distributed Systems, Vol. 18, No. 12, December 2007,pp. 1649-1662.
  5. Min Cai, Kai Hwang, Yu-Kwong Kwok,Shanshan Song, And Yu Chen," Collaborative Internet Worm Containment", Security & Privacy, IEEE,Vol. 3,pp. 25-33.
  6. Stefan Savage, David Wetherall and Anna Karlin and Tom Anderson," Network Support for IP Traceback", IEEE/ACM Transactions On Networking, Vol. 9, No. 3, June 2001,pp. 226-237.
  7. Andrey Belenky and Nirwan Ansari," On IP Traceback", New Jersey Institute of Technology
  8. Peer to Peer network:http://www. doubleeaglesserviceinc. com
  9. Stephanos Androutsellis-Theotokis "A Survey of Peer-to-Peer File Sharing Technologies",pp. 8.
  10. William Stallings," Cryptography and Network Security Principles and Practices",Fourth Edition,pp. 615-619.
  11. Worm and its types: http://www. ehow. com
Index Terms

Computer Science
Information Sciences

Keywords

Peer-to-peer Collaborative Network Security Malicious Software.