IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. 770-773

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Shrinking Of Destructive Actions in Peer To Peer Systems A.Rupa1, D.Jamuna2 1

M.Tech Student, Dept of CSE, CMR Institute of Technology, Medchal, Hyderabad, India [email protected]

2

Associate Professor, Dept of CSE, CMR Institute of Technology, Medchal, Hyderabad, India

Abstract Ample works on reputation as well as trust management in online communities have come out in recent times. A design was put up in support of trust management which relies on the entire system layers, specifically network, storage as well as trust management, on peer-to-peer method. Self organizing system was projected that intends to decrease malicious action in a peer to peer system by means of setting up relations of trust between peers in their propinquity. The trust of Service and trust of recommendation are most important metrics to calculate dependability in the service and the contexts of recommendation correspondingly. Self organizing system defines three metrics of trust, a peer interrelates less with new arrivals as its set of connections grows and as a result rate of attacks of service-based reduces with time. Keywords: Peer, Self organizing system, Trust management, Malicious activity. 1. INTRODUCTION In recent times, a model was put forward in support of small-world phenomenon based on a category of random networks that interpolates among two extremes. Such a representation captures critical parameters of social networks such as there is an undemanding fundamental structure that describes the occurrence of the majority edges, but a only some edges are formed by a unsystematic process that does not esteem this structure [1]. In various times, information concerning the interactions of past and recommendations are accumulated to weigh up capability and reliability of acquaintances. By means of information of trust does not explain all safety problems in the systems of peer to peer however can augment safety and efficiency of systems. The reputation management component is accountable in support of collecting information concerning past behaviour of members of neighbourhood under deliberation plus making this information accessible for others to utilize. After data concerning past interactions of possible partners has been gathered, the trust management component comes into play by means of calculating prediction of their upcoming performance. In view of the fact that self organizing system assembles recommendations only from acquaintances, the queries of reputation return additional reliable information. Self organizing system, enables peers to set up stronger confidence relationships and peers transmit queries of reputation only to peers interacted in the earlier period, which reduces network A.Rupa, IJRIT

770

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. 770-773

traffic when compared to the approaches of flooding-based [2][3]. When calculating the metric of reputation, recommendations are calculated on the basis of trust metric of recommendation. It is significant while deciding concerning strangers and novel connections and losses of reputation its significance as understanding with an acquaintance augments.

2. AN EXPOSURE TOWARDS PEER TO PEER SYSTEMS: The speedy expansion of Internet and accompanying networking technologies have made it promising in support of any computer in the region of globe to take part in a collaborative situation [4]. In a P2P communication, conventional difference among clients and back-end servers is merely disappearing. Each node of system plays the responsibility of client as well as server. Gnutella is a superior example of a P2P achievement narrative which is moderately straightforward software enables Internet users to generously replace files. The basic difficulty associated towards reputation-based trust management in P2P system is that information concerning transactions carried out among peers is disseminated through-out network with the intention that each peer can merely construct an approximation of comprehensive situation within network. Peer to peer networks is used as a means of transport to blowout malware that offers some significant benefits above worms that spread by scanning for susceptible hosts which is mainly due to the procedure engaged by the peers to examine for content. A structural design was put up in support of trust management which relies on the entire system layers, specifically network, storage as well as trust management, on peer-to-peer method. Peers are supposed to be strangers to each other at the beginning in the model of self organizing system and by means of a service of a peer is an interface, which is evaluated on the basis of weight and recentness of the communication, and approval of the requester. Recommender’s responsibility and assurance concerning recommendation are measured when assessing recommendations in addition; service and recommendation contexts are separated and enabled us to determine constancy in an extensive selection of attack situations. The central server firmly accumulates trust information and describes the metrics of trust. Each peer build up its individual local view of trust concerning the peers interacted in the earlier period.

A.Rupa, IJRIT

771

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. 770-773

Fig1: An overview of peer to peer network.

3. AN OVERVIEW OF SELF ORGANIZING SYSTEM A tool of peer to peer file sharing simulation was implemented and conducted research to appreciate impact of self organizing system in the attacks of mitigating [5]. Self organizing system was proposed that intends to decrease malicious action in a peer to peer system by means of setting up relations of trust between peers in their propinquity. When self organizing system is used, peers structure their individual trust network with time and do not appeal recommendations from unreliable peers. In self organizing system to appraise connections and recommendations improved, significance and parameters of peer satisfaction are measured. Peers do not attempt to gather trust information from all peers. Self organizing system defines three metrics of trust, a peer interrelates less with new arrivals as its set of connections grows and as a result rate of attacks of service-based reduces with time. When calculating the metric of reputation, recommendations are calculated on the basis of trust metric of recommendation. In addition, every peer expands its trust system with time in addition can get hold of additional convincing recommendations from acquaintances. In view of the fact that self organizing system assembles recommendations only from acquaintances, the queries of reputation return additional reliable information. If interactions are modelled accurately, then self organizing system can be modified to a variety of peer to peer applications and hence considers services of providing and giving suggestions as different responsibilities and describes two contexts of trust such as contexts of service and recommendation [6].

4. RESULTS: Circumstances of Service and recommendation facilitate improved measurement of dependability in providing services and offering recommendations. While self organizing system assembles recommendations only from acquaintances, the queries of reputation return additional reliable information. File sharing simulation program is put into practice in Java to scrutinize results of using self organizing system in an environment of peer to peer. The trust of Service and trust of recommendation are most important metrics to calculate dependability in the A.Rupa, IJRIT

772

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. 770-773

service and the contexts of recommendation correspondingly. Self organizing system was proposed that intends to decrease malicious action in a peer to peer system by means of setting up relations of trust between peers in their propinquity. Research on self organizing system demonstrates that good peers can protect themselves aligned with malicious peers devoid of having information of global trust and let a peer consider reliability of other peers on the basis of local information. The performance of self organizing system is the finest in all test cases and enables peers to set up stronger confidence relationships.

5. CONCLUSION: In various times, information concerning the interactions of past and recommendations are accumulated to weigh up capability and reliability of acquaintances. The basic difficulty associated towards reputation-based trust management in P2P system is that information concerning transactions carried out among peers is disseminated through-out network with the intention that each peer can merely construct an approximation of comprehensive situation within network. A tool of peer to peer file sharing simulation was implemented and conducted research to appreciate impact of self organizing system in the attacks of mitigating. By means of information of trust does not explain all safety problems in the systems of peer to peer however can augment safety and efficiency of systems. When self organizing system is used, peers structure their individual trust network with time and do not appeal recommendations from unreliable peers as a result, can efficiently alleviate attacks of recommendation support with time. If interactions are modelled accurately, then self organizing system can be modified to a variety of peer to peer applications and hence considers services of providing and giving suggestions as different responsibilities and describes two contexts of trust such as contexts of service and recommendation.

REFERENCES [1] F. Cornelli, E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, “Implementing a ReputationAware Gnutella Servent,” Proc. Networking 2002 Workshops Web Eng. and Peer-to-Peer Computing, 2002. [2] B. Yu, M.P. Singh, and K. Sycara, “Developing Trust in Large- Scale Peer-to-Peer Systems,” Proc. IEEE First Symp. Multi-Agent Security and Survivability, 2004. [3] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, “Randomized Gossip Algorithms,” IEEE/ACM Trans. Networking, vol. 52, no. 6, pp. 2508-2530, June 2006. [4] B. Ooi, C. Liau, and K. Tan, “Managing Trust in Peer-to-Peer Systems Using Reputation-Based Techniques,” Proc. Fourth Int’l Conf. Web Age Information Management, 2003. [5] R. Sherwood, S. Lee, and B. Bhattacharjee, “Cooperative Peer Groups in Nice,” Computer Networks, vol. 50, no. 4, pp. 523-544, 2006. [6] Y. Wang and J. Vassileva, “Bayesian Network Trust Model in Peer-to-Peer Networks,” Proc. Second Workshop Agents and Peer-to- Peer Computing at the Autonomous Agents and Multi Agent Systems Conf. AAMAS), 2003. A.Rupa, IJRIT

773

Shrinking Of Destructive Actions in Peer To Peer Systems

to peer networks is used as a means of transport to blowout malware that offers some significant benefits above worms that spread by scanning for susceptible ...

81KB Sizes 1 Downloads 175 Views

Recommend Documents

A Survey on Shrinking Of Destructive Actions in Peer ...
Tech Student, Dept of CSE, CMR Institute of Technology, Kandlakoya Medchal, .... achievement narrative which is moderately straightforward software enables ...

CONTENT LOCATION IN PEER-TO-PEER SYSTEMS: EXPLOITING ...
Jan 18, 2001 - several different content distribution systems such as the Web and popular peer- .... (a) Top 20 most popular queries. 1. 10. 100. 1000. 10000. 100000 ..... host is connected to monitoring ports of the two campus border routers. .....

CONTENT LOCATION IN PEER-TO-PEER SYSTEMS: EXPLOITING ...
Jan 18, 2001 - several different content distribution systems such as the Web and ..... host is connected to monitoring ports of the two campus border routers.

A Blueprint Discovery of Hybrid Peer To Peer Systems - IJRIT
unstructured peer to peer system in which peers are connected by a illogical ... new hybrid peer to peer system for distributed data sharing which joins the benefits ..... [2] Haiying (Helen) Shen, “IRM: Integrated File Replication and Consistency 

A Blueprint Discovery of Hybrid Peer To Peer Systems - IJRIT
*Head of the Department, Department of Computer Science & Engineering, ... Home networks that utilize broadband routers are hybrid peer to peer and ... peers, and select a super peer in each cluster as a local server to manage the cluster.

Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems
A core problem in peer to peer systems is the distribu- tion of items to be stored or computations to be car- ried out to the nodes that make up the system. A par-.

Ant-inspired Query Routing Performance in Dynamic Peer-to-Peer ...
Faculty of Computer and Information Science,. Tržaška 25, Ljubljana 1000, ... metrics in Section 3. Further,. Section 4 presents the course of simulations in a range of .... more, the query is flooded and thus finds the new best path. 3.2. Metrics.

Securing Key Issuing in Peer-to-Peer Networks
tacks against key issuing phase. In real-world P2P networks, it is important to keep in secret whether the private key corresponding to a certain identity has been requested. Hence, it is important to have an anonymous key issuing scheme without secu

Issues in Peer-to-Peer Networking: a Coding ...
Peer-to-peer (P2P) file distribution algorithms are an active ... While network coding has been applied to P2P systems to improve robustness ... sharing model.

Instant Advertising in Mobile Peer-to-Peer Networks
models [6][7][8] in which users retrieve information from middle-ware service ... propagation manner (gossiping vs exchange at encounter) and different probability ..... pure gossiping model plus optimization mechanism (1) &. (2) as Optimized ...

Viability of Microsoft Peer-to-Peer Framework for ...
One example of this is Windows Mobile Smartphone devices support an email channel to allow them to communicate using the simple data services provided ...

Forensic Investigation of Peer-to-Peer File Sharing ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Forensic Investigation of Peer-to-Peer File Sharing Net ... ely, Thomas Kerle, Brian Neil Levine, Clay Shiel

Ant-inspired Query Routing Performance in Dynamic Peer-to-Peer ...
Faculty of Computer and Information Science, ... node departures and joins per one generated query. .... help them build efficient routes in the overlay faster.

From Peer-to-Peer Networks to Cloud.pdf
Follow this and additional works at: http://digitalcommons.pace.edu/lawfaculty. Part of the Computer Law Commons, Criminal Law Commons, Internet Law ...

Forensic Investigation of Peer-to-Peer File Sharing Networks by ...
Massachusetts State Police, [email protected] ... Specifically, over 40 agencies share data ... provides a partial list of current peers (called a GWe- bCache), or by using a list of known peers distributed ... Sharing Networks by, Marc Li

Towards Yet Another Peer-to-Peer Simulator
The cost of implementation is less than that of a large-scale ..... steep, rigid simulation architecture that made extension difficult and software or hardware system ... for the simulation life cycle, the underlying topology and the routing of ...

ID SERVER STREAMING USING PEER TO PEER ... - Semantic Scholar
Also, by caching the requests at the clients, better content distribution of data is possible. For example, let us ... a smooth delivery of data. Different .... server partition will not have strict real time requirements and can be updated depending

Building Low-Diameter Peer-to-Peer Networks
build P2P networks in a distributed fashion, and prove that it results in ...... A Measurement. Study of Peer-to-Peer File Sharing Systems, in Proceedings.

Method and apparatus for facilitating peer-to-peer application ...
Dec 9, 2005 - microprocessor and memory for storing the code that deter mines what services and ..... identi?er such as an email address. The person making the ..... responsive to the service request from the ?rst application received by the ...

Leeching Bataille: peer-to-peer potlatch and the ...
with conceptualising the actual practice of gifting and how it can best be understood in relation to ... These effects can no longer be restricted to their online aspect. ..... This is a description of a noble and valuable social practice: “filesha

June 2014 Peer-to-Peer Webinars.pdf
... level emergency pre- paredness site reviewer, has co-authored a hospital evacuation course for the Federal Emergency Management Agency (FEMA), and is.