Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems

Size: px
Start display at page:

Download "Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems"

Transcription

1 Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems Jigyasu Dubey Department of Information Technology Shri Vaishnav Institute of Technology & Science Indore, India Dr.(Mrs.) Vrinda Tokekar Department of Information Technology IET, Devi Ahilya Vishwavidyalaya Indore, India Abstract In recent years P2P computing systems gain popularity and impact due to the anonymity, dynamism, scalability, and cost sharing. Due to autonomy of peers and open environment, security is big issue in P2P computing systems. Traditional security mechanisms used in centralized systems are not suited for P2P computing systems because there is no central point of authority. The working of a P2P computing system is highly dependent on collaboration of peers. To improve the collaboration between peers many trust management systems have been developed recently. This study proposed a Bayesian network based trust model with time window to measure the trustworthiness of task processor peer in pure P2P computing framework. The proposed model is compared with Bayesian network based trust model using JADE This shows that proposed model identify malicious peers earlier than the Bayesian network based trust model in a P2P computing system. Keywords P2P; Trust; Bayesian Network; Security I. INTRODUCTION In recent years P2P computing systems gain popularity and impact due to the anonymity, dynamism, scalability, and cost sharing. The P2P architecture provides an open, unrestricted environment for resource sharing [1]. It has ability to aggregate the resources like CPU cycles, memory, etc. of peers in order to build a system with enormous resources [2] [3]. However, specific characteristics of P2P architecture like heterogeneity, anonymity, autonomy, and openness makes it an ideal environment for attackers, and leads to many security problems in P2P computing systems. The P2P computing systems do not have any central point of control or authority. They have more security threats than centralized systems due to its open nature [4]. In a distributed system without centralized server for authority, providing security mechanism is more complicated. In pure P2P computing systems security issues are one of the major challenges that need to be taken care off. The key for correct functioning of the P2P System is collaboration between the peers. The P2P computing system expects certain level of honesty in peers. However as number of peer increases in a system, number of peer with malicious behavior also increases who are responsible for security attacks and threats to the whole system [3]. Due to decentralization in P2P systems, it is not possible to have any centralized mechanism to protect peers from threats and malicious peers. Peers are required to protect themselves, to be responsible for their own behavior and to inform other peers about threats and malicious peers in the system. At the same time, by some mean they also need to evaluate the facts received from other peers for their trueness and peers for their reliability. In P2P computing systems security issues relate more with trustworthiness. To encourage the peers for positive participation in P2P system, there is need for mechanisms to maintain the trust between peers in P2P computing systems. To encourage honest and co-operative behavior among peers, trust management is a successful approach to maintain trustworthiness of the system. In a system, trust between peers developed with time and is measurable [5]. To establish the trust between peers, reputation mechanism is one way which is also used as risk management technique. Reputation systems provide a way for peers to be able to trust other peers. The main issues in reputation system are management of trust measures, handling unfair feedbacks, controlling malicious attacks on peers and monitoring of free riders, those who are always interested in using system resources but do not contribute much to the system. In a P2P system, the trust of a peer in another peer depends upon the multiple attributes shown by that peer like- reliability, availability, honesty, truthfulness, security, competence, and timelines which depends on the environment and requirement of peer. Depending on circumstances peer s requirement are different, a peer require considering its trust in a specific attribute or in multiple attributes. The Bayesian networks provide a flexible method to present differentiated trust and combine different aspects of trust [6]. This study proposed a Bayesian network based trust model with time window to calculate trust between Task Distributor peers and Task Processor peers in pure P2P computing frame work [7]. This study modified the Bayesian network based trust model [6] by adding the aspect of time window in calculation of trust. II. RELATED WORK The research on trust and reputation has attracted a lot of interest from researchers in P2P networks. The P2P networks are open, distributed and composed of autonomous peers that

2 act on behalf of their users. Hence the key to a successful P2P system is cooperation among the peers of that system while achieving their individual goals [8]. In last few years many trust management techniques have been developed for P2P computing networks. Here we briefly describe some techniques developed for providing security in P2P computing systems. Xue Chen, Guisheng Chen and et al. in [4] summarized the problems for trust management in different kind of P2P networks. The authors classify peers in three categories according to their contribution in the network: good nodes, malicious nodes, and average nodes. The good nodes share the authentic files and try to offer service to other peers. Malicious nodes are attacker of the system. The average nodes are free riders. They also give trust classification and identify some trust factors for building a trust model in P2P networks. For trust evaluation, authors introduce the general trust function. However, focusing on specific application like distributed computing, there may have specific trust factors that should be considered besides the general trust factors given by the authors. Stefan Kraxberger and Udo Payer in [9] specify a P2P model and gives security concept for this. In this work authors divide security concept in to two parts: routing security concept and group security concept. Ajay Ravichandran and Jongpil Yoon in [10] proposed a trust management algorithm called Eigen group trust. The algorithm built on top of a peer group infrastructure that not only manages trust within groups but also between different groups. In this work authors proposed a hybrid solution connecting reputation management and peer communities. The proposed algorithm is based on Eigen Trust where a peer will calculate global trust value by obtaining reputation values from all peers in the network. They also propose a delegation model that is extended to any group based P2P community and also provide an effective credibility measure. However, in this work authors do not considered anonymity of peers. Jung-Tae Kim, Hae-Kyeong et.al. in [11] brief about different issues related to security in P2P systems including identified threats, various protection methods used and give suggestions for further enhancements on the security mechanism in P2P systems. Chen Ding, Chen Yueguo et.al. in their work [4] present a computational trust management model to shows the relationships based on trust and reputation by calculating reputation scores. The authors also studied DMRep and EigenRep reputation based trust management protocols, through which the computation and maintenance of reputation scores are analyzed. However more extensive evaluation methods over wider parameters are required. Alvaro Arenas, Michael Wilson et.al [5] present an overview of the different concepts and technologies relevant to trust management in Grid systems. They also give the relation between trust and security in distributed system and Grids. Tu Chao et al. in [12] presented an improved trust model which not only considers a value of reputation of service to measure the quality of service, but also adds credibility of recommendation to measure the accuracy of the information of recommendation. The authors in same introduce the random extraction algorithm based on credibility of recommendation to select the recommendation peers, which reduces traffic and also enhances credibility of information of recommendation. Yao Wang and Julita Vassileva in [6] present a Bayesian network-based trust model for Peer-to-Peer file sharing applications. This model describes a trust and reputation mechanism that allows agents to identify companions who meet their individual requirements, through individual experience and sharing experiences with other agents with similar preferences. However some more aspects need to be added in the Bayesian networks that influence the system performance. The aspects used in Bayesian network are related to the only P2P file sharing networks. The aspects which influence performance of P2P computing systems need to be identified and these different aspects may be used to develop Bayesian Network based trust model for P2P computing systems. III. BAYESIAN NETWORK BASED TRUST MODEL WITH TIME WINDOW In a P2P computing system, task processor peer s capabilities are not uniform. For example, some task processor peers may be connected through a high speed network, while others connect through slow modem. Some task processor peers may have high speed processor while others have slow processor. Therefore task processor peer s capability can be represented by various characteristics, such as peer credibility, peer computation time [13] and peer distance [14]. A. Peer Credibility It is the probability that the result produced by a task processor peer is correct and is denoted by C P. It defines as: (1) Here E R, C R, and I R represent the number of erroneous results, correct results, and incomplete results respectively. The denominator E R + C R + I R represents the total number of tasks that a task processor peer computes. B. Peer Computation Time It is the expected computation time when a peer processes the system s computation during IT denoted by PC T. (2) Where IT is peers ideal time and A P is peer availability. The PC T represent the time when a peer actually executes the system s computation in the presence of peer autonomy failures. C. Peer Distance It is the distance between the task distributor and task processor peer and denoted by D (T D, T P ), where T D is the task distributor peer and T P is a task processor peer. It is defined as the time interval between the instance where T D dispatch a task unit to T P, and the time the result of this task unit is returned to T D. The distance D (T D, T P ) is the turnaround time of a task unit, and given as: (3)

3 Where T S denotes the time when T D dispatches a task unit to T P, and T C denotes the time when T D receives result of same task unit. D. Bayesian Trust In a P2P computing system the task distributor peer want to know the task processor peer s overall capability. Here we apply Bayesian network-based trust model proposed by Y. Wang [6] to represent the probability relationships between the overall evaluation and different characteristics of a task processor peer in pure P2P computing system as shown in Fig.1. The root node R represents a task distributor peer s evaluation on transactions with a task processor peer. The leaf nodes represent different characteristics of the task processor peers. Each node is associated with some value as shown in Fig. 1. One can easily obtain different probabilities of R given various conditions. The different probabilities of R represent the different trust values under the different needs of task distributor peer. Here task distributor peer can develop his Bayesian network based on own previous transactions with task processor peer, which provides an automatic way to adapt to its needs. A naïve Bayesian network provides a flexible way to represent the trust between a task distributor peer and a task processor peer. The task distributor peer develops a naïve Bayesian network for each task processor peer that it has interacted with. Every Bayesian network has two values for the root node R satisfied and unsatisfied, denoted by 1 and 0, respectively as shown in Fig. 1. The p(r=1) represent value of task distributor peer s overall trust in the task processor peer s capability to process a task. The p(r=1) is percentage of transactions that are satisfying and p(r=0) is percentage of not satisfying transactions occur within a time interval K'. E. Time Window Time Window of length K consists of the most recent K transaction, task distributor peer T D undertook with task processor peers in the transaction table. If the upper bound and lower bound of the time window is α and β respectively, we represent time window K as α β + 1. The time window will be personalized according to the requirements of the task distributor peer. TABLE I. Outcome THE CONDITIONAL PROBABILITY TABLE FOR NODE T The Number of Transactions given the outcome in time window K R=1 A p (R=1) = a / (a + b) R=0 B p (R=0) = b / (a + b) TABLE II. High Medium Low THE CONDITIONAL PROBABILITY TABLE (CPT) FOR NODE PEER CREDIBILITY The no. of transaction given R=1, in Time Window K m1 m2 m3 when R=1 = high R = 1) = m1 / a = medium R = 1) = m2/a = low R = 1) = m3/a The no. of transaction given R=0, in Time Window K n1 n2 n3 when R=0 = high R = 0) = n1 / b = medium R = 0) = n2 / b = low R = 0) = n3 / b Table 1 shows conditional probability table (CPT) for the node R. The a and b represent total number of satisfying transactions and unsatisfying transactions occur within time window K, respectively. It also stores the value of total transaction number when R=1 and R=0. The leaf nodes under the root node represent the different characteristics of the task processor peers. For every leaf node a conditional probability table (CPT) is defined. The node denoted by peer credibility, represents how much results produced by the peer are correct. It includes three values, high, medium, and low. Its CPT is shown in table II. Each column follows one constraint, which corresponds to one value of the root node. The sum of values of each column is equal to 1. Here m1, m2, and m3 represent the numbers of transactions satisfied when value for peer credibility are high, medium, and low respectively. Similarly n1, n2, and n3 denote the numbers of transactions unsatisfied with these three values. For example, p (credibility = high R = 1) is the conditional probability with the condition that a transaction is satisfied when credibility value is high. It measures the probability that task processor peer has high credibility and transaction is satisfied. The derivation to calculate this probability is given as below:- Fig. 1. Bayesian Trust

4 (4) The other probabilities in table II are calculated in similar way. With the naïve Bayesian networks, task distributor peer can set various conditions according to his needs and calculate its trust in a task processor peer in the various aspects from the corresponding probabilities. F. Updating the Bayesian Network A task distributor peer s trust in a task processor peer is built over time. After each transaction, the task distributor peer will update its corresponding Bayesian networks for the task processor peer to add its new experience. The trust model should motivate a peer to contribute continuously and thus including the effect of peer dynamics. It is unrealistic to consider peer s behavior from beginning of its first interaction or even to assign partial weights to transactions further down the time line. In our model, to motivate peers we consider peers present behavior rather than past behavior by providing time window. The time window represents the no. of last k transactions rather than all previous transactions. By defining a time window we ensure that the previous behavior of peer does not have an effect on its trust value, since trust should always be a measure of peer s current behavior. After each transaction with task processor peer, the task distributor peer will evaluate the transaction. The task distributor peer might have different criteria to judge a transaction. The overall evaluation of a transaction is a combination of evaluations of each aspect related to transaction, such as credibility, computation time, and peer distance. How to combine evaluations of each aspect depends on task distributor peer s requirements. For example some tasks require high accuracy while some concerned about fast processing. The result of overall evaluation, transaction is satisfied or not satisfied, is used to update the task distributor peer s trust in task processor peer. (5) Where W cr + W ct + W D = 1. Where W cr, W ct, and W D denote weights, indicate importance of respective aspects for task distributor peer. The task distributor peer has a satisfaction threshold S T. If S < S T, the transaction is unsatisfied. If S S T, transaction is satisfied. IV. THE METHOD In pure P2P computing system when a task distributor peer announces job availability, it gets the response from number of task processor peers to process task. If task distributor peer distribute subtask to such task processor peers which has low credibility or high distance, the task distributor peer will not get the correct results or will not get results within required time period. If this type of circumstances occurs repeatedly, the task distributor peer will be irritated. To solve this issue we use Bayesian network based trust model. When a task distributor peer receives responses from interested task processing peers, it makes the list of task processing peers according to their trust values. Now task distributor peer select the highly trusted task processor peers and distribute the task among them. If the task distributor peer has no previous transaction with the task processor peer, it query to other task distributor peers in the group. V. PERFORMANCE EVALUATION To evaluate the proposed method, a model to simulate the behaviour of task distributor peers and task processor peers has been developed in JADE The aim of this experiment is to see that the proposed method helps task distributor peers to select best task processor peers that match their preferences. In this experiment task distributor peer is interested in correct and fast result, i. e. those peers which have high credibility with fast computation time. For every task processor peer, it calculates the p as per (4) with time window k = 03. The simulation considers total 05 task processor peers named as TP1, TP2,., TP5 and 15 transactions T1, T2,, T15. Here peer TP3 and TP5 performs malicious behavior for some time. The same simulation is also run for the Bayesian Network based trust model and results of both models are compared as shown in fig 2 (a) & (b). The comparison, given in fig 3(a) & (b), shows that with time window equal to 03 the trust value of a peer fall 65% more than the Bayesian network based trust model after first malicious transaction, and it is almost 150% more in next successive malicious transaction. This shows that the trust value of malicious peers reduced very slowly in Bayesian trust model, however in proposed model the trust value of malicious peers reduced very fast. Hence this model identifies malicious peers earlier then Bayesian trust model in a P2P computing system. VI. CONCLUSIONS This study proposed a Bayesian network based trust model with time window to model differentiated trust and combine different aspect of trust in a Pure P2P Computing System. By the help of this model task distributor peer is able to identify good task processor peers to distribute task for processing. More specifically, the trust model allows task distributor peer to model the trustworthiness of task processor peers based on their previous transactions occur within time window. The proposed model is compared with Bayesian network based trust model. The comparison shows that proposed model identifies malicious peers earlier than Bayesian trust model in a P2P computing system. In this method every task distributor peer needs to maintain the Bayesian network for each task processor peer and CPT of each aspect. In a small size network this method is well suited but for large networks it has limitations because task distributor peers have their own limit to store number of Bayesian Network for every task processor peer. This method is useful in systems where task distributor peer repeatedly interact with

5 same task processor peers. This method is also applicable in large P2P networks because they have small world phenomenon hence number of Bayesian network required to maintain on task distributor peer are limited. (b) Fig. 2 (a) Bayesian Network based Trust Model & (b) Bayesian Network based Trust Model with Time Window. (a) (a) REFERENCES [1] Dejan S. Milojicic, Vana Kalogeraki, Rajan Lukose, Kiran Nagraja, Jim Prune, Bruno Richard, Sami Rollins, Zhichen Xu, P2P Computing, HP Lab Technical Report, HPL R1, March [2] INTEL, P2P-Enabled Distributed Computing, Intel White Paper, [3] Cheng Ding, Chen Yueguo, Cheng Weiwei, A Survey Study on Trust Management in P2P Systems, Technical Report, [4] Xue Chen, Guisheng Chen, Jin Liu, Xiangfeng Luo, Xuhui Li, and Bing Li, Trust Factors in P2P Networks, published in proceedings of the IEEE International Workshop on Semantic Computing and Systems (WSCS '08), pp 49-54, [5] Alvaro Arenas, Michael Wilson, Brian Matthews, On Trust Management in Grids, Invited paper in ICST 2007 [6] Yao Wang, Julita Vassileva, Bayesian Network-Based Trust Model, Published in Proceedings of IEEE/WIC International Conference on Web Intelligence WI '03, pp , [7] Dubey J., and Tokekar V., A Framework for Pure Peer-to-Peer Computing System, Published in Proceedings of Ninth IEEE and IFIP International Conference Wireless and Optical Communications Networks WOCN2012 Next Generation Internet, pp. 1-5, [8] Prashant Dewan, Partha Dasgupta, Securing P2P Networks Using Peer Reputations: Is there a Silver bullet?, Published in Proceedings of Second IEEE International Conference on, Consumer Communications and Networking Conference CCNC 2005, pp , [9] Stefan Kraxberger, Udo Payer, Security concept for Peer-to-Peer Systems, Published in Proceeding of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly IWCMC '09, pp , [10] Ajay Ravichandran, and Jongpil Yoon, Trust Management with Delegation in Grouped Peer-to-Peer Communities, Proceeding of the eleventh ACM symposium on Access control models and technologies SACMAT '06, pp , [11] Jung-Tae Kim, Hae-Kyeong,Park, Eui-Hyun Paik, Security Issues in Peer-to-Peer Systems, Published in proceedings of 7th International Conference on Advanced Communication Technology, ICACT 2005, Volume: 2, Page(s): , [12] Tu Chao, Hu Chaoju, and Li Shengli, An Improved Trust Model Based on Reputation in P2P Networks, Published in Proceedings of IEEE Asia-Pacific Conference on Wearable Computing Systems 2010, pp , [13] Jigyasu Dubey, Dr. (Mrs.) Vrinda Tokekar, Identification of Reliable Peer Groups in Peer-to-Peer Computing Systems, Published in proceedings of Third International Conference on Advances in Communication, Network, and Computing CNC 2012 and LNICST Vol. 108, pp , [14] Jigyasu Dubey, Dr. (Mrs.) Vrinda Tokekar, Identification of Efficient Peers in P2P Computing Systems for Real Time Applications, Published in International Journal of Peer to Peer Networks (IJP2P) Vol.3, No 6, pp , November (b) Fig. 2 (a) Comparison of Trust Values of TP3 with BN & BN with TW (b) Comparison of Trust Values of TP5 with BN & BN with TW.

Bayesian Network-Based Trust Model

Bayesian Network-Based Trust Model Bayesian Network-Based Trust Model Yao Wang, Julita Vassileva University of Saskatchewan, Computer Science Department, Saskatoon, Saskatchewan, S7N 5A9, Canada {yaw181, jiv}@cs.usask.ca Abstract In this

More information

Study of Trust Management Approaches in Peer to Peer System

Study of Trust Management Approaches in Peer to Peer System Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Santosh

More information

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

Recommendation-Based Trust Model in P2P Network Environment

Recommendation-Based Trust Model in P2P Network Environment Recommendation-Based Trust Model in P2P Network Environment Yueju Lei, Guangxi Chen To cite this version: Yueju Lei, Guangxi Chen. Recommendation-Based Trust Model in P2P Network Environment. Zhongzhi

More information

Evaluation of VO Intersection Trust model for Ad hoc Grids

Evaluation of VO Intersection Trust model for Ad hoc Grids Evaluation of VO Intersection Trust model for Ad hoc Grids Ladislav Huraj and Vladimir Siládi Abstract Trust is an integral part of grid computing systems. Traditional grid environment uses various, mostly

More information

Trust in Ad hoc Networks A Novel Approach based on Clustering

Trust in Ad hoc Networks A Novel Approach based on Clustering Trust in Ad hoc Networks A Novel Approach based on Clustering J. Boodnah and E.M. Scharf Department of Electronic Engineering, Queen Mary, University of London Abstract Ad hoc Networks by virtue of their

More information

SOT Model towards Peer to Peer System

SOT Model towards Peer to Peer System SOT Model towards Peer to Peer System 1 S JOHN BEE, 2 B.RANJITH 1 M.Tech Research Scholar, Priyadarshini Institute of Technology and Science for Women 2 HOD-CSE, Priyadarshini Institute of Technology and

More information

A Framework of Decentralized PKI Key Management Based on Dynamic Trust

A Framework of Decentralized PKI Key Management Based on Dynamic Trust A Framework of Decentralized PKI Key Management Based on Dynamic Trust Zhiqian Xu 1 and Hai Jiang 2 1 FedEx Corporation, Collierville, TN, U.S.A. 2 Dept. of Computer Science, Arkansas State University,

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Entropy-Based Recommendation Trust Model for Machine to Machine Communications

Entropy-Based Recommendation Trust Model for Machine to Machine Communications Entropy-Based Recommendation Trust Model for Machine to Machine Communications Saneeha Ahmed and Kemal Tepe 1 University of Windsor, Windsor, Ontario, Canada {ahmed13m,ktepe}@uwindsor.ca Abstract. In a

More information

Load Balancing Algorithm over a Distributed Cloud Network

Load Balancing Algorithm over a Distributed Cloud Network Load Balancing Algorithm over a Distributed Cloud Network Priyank Singhal Student, Computer Department Sumiran Shah Student, Computer Department Pranit Kalantri Student, Electronics Department Abstract

More information

Flight Recommendation System based on user feedback, weighting technique and context aware recommendation system

Flight Recommendation System based on user feedback, weighting technique and context aware recommendation system www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 5 Issue 09 September 2016 Page No.17973-17978 Flight Recommendation System based on user feedback, weighting

More information

Bayesian Network-Based Trust Model

Bayesian Network-Based Trust Model Bayesian Network-Based Trust Model Yao Wang, Julita Vassileva University of Saskatchewan, Computer Science Department, Saskatoon, Saskatchewan, S7N 5A9, Canada {yaw181, jiv}@cs.usask.ca Abstract We review

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation Wireless Network Security 18-639: Spring 2011 Arjun Athreya March 3, 2011 Survey: Trust Evaluation A scenario LOBOS Management Co A CMU grad student new to Pittsburgh is looking for housing options in

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

arxiv: v1 [cs.cr] 30 May 2014

arxiv: v1 [cs.cr] 30 May 2014 ROMEO: ReputatiOn Model Enhancing OpenID Simulator Ginés Dólera Tormo 1, Félix Gómez Mármol 1, and Gregorio Martínez Pérez 2 arxiv:1405.7831v1 [cs.cr] 30 May 2014 1 NEC Europe Ltd., Kurfürsten-Anlage 36,

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Comparison of Various Role Based Access Control Scheme

Comparison of Various Role Based Access Control Scheme Comparison of Various Role Based Access Control Scheme Kritika Soni, Suresh Kumar Manav Rachna International Institute of Research and Studies Faridabad,India Abstract - The cloud computing is most widely

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Collaboration System using Agent based on MRA in Cloud

Collaboration System using Agent based on MRA in Cloud Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal

More information

TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES

TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES TERM BASED WEIGHT MEASURE FOR INFORMATION FILTERING IN SEARCH ENGINES Mu. Annalakshmi Research Scholar, Department of Computer Science, Alagappa University, Karaikudi. annalakshmi_mu@yahoo.co.in Dr. A.

More information

Problems in Reputation based Methods in P2P Networks

Problems in Reputation based Methods in P2P Networks WDS'08 Proceedings of Contributed Papers, Part I, 235 239, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Problems in Reputation based Methods in P2P Networks M. Novotný Charles University, Faculty of Mathematics

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH

More information

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices*

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks) Contents

More information

A Composite Trust based Public Key Management in MANETs

A Composite Trust based Public Key Management in MANETs USMA 6 th Network Science Workshop April 23, 2012 West Point, NY U.S. Army Research, Development and Engineering Command A Composite Trust based Public Key Management in MANETs Jin-Hee Cho and Kevin Chan

More information

Web Service Recommendation Using Hybrid Approach

Web Service Recommendation Using Hybrid Approach e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 648 653 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Web Service Using Hybrid Approach Priyanshi Barod 1, M.S.Bhamare 2, Ruhi Patankar

More information

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,

More information

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview

Securing MANETs using Cluster-based Certificate Revocation Method: An Overview Securing MANETs using Cluster-based Certificate Revocation Method: An Overview Mrs. Dipti S. Sawant Dept. of Computer Engineering, Sinhgad College of Engineering, Pune, India. 411 041 Prof. J. E. Kamalasekaran

More information

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS R. K. Prasad and Vipin Sharma 1 Department of Mechanical Engineering ABSTRACT: P A College of Engineering Nadupadavu, Mangalore, India In this implemented

More information

AN ADAPTIVE P2P TOPOLOGY EVOLVEMENT MODEL BASED ON INTEREST SIMILARITY

AN ADAPTIVE P2P TOPOLOGY EVOLVEMENT MODEL BASED ON INTEREST SIMILARITY AN ADAPTIVE P2P TOPOLOGY EVOLVEMENT MODEL BASED ON INTEREST SIMILARITY Li Yang, Changyou Xing, Yusen Zhang, and Jinshuang Wang Institute of Command Automation, PLA University of Science and Technology

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Bayesian Network-Based Trust Model in Peer-to-Peer Networks

Bayesian Network-Based Trust Model in Peer-to-Peer Networks Bayesian Network-Based Trust Model in Peer-to-Peer Networks Yao Wang, Julita Vassileva University of Saskatchewan, Computer Science Department, Saskatoon, SK, S7N 5A9, Canada {yaw181, jiv}@cs.usask.ca

More information

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Survey on Community Question Answering Systems

Survey on Community Question Answering Systems World Journal of Technology, Engineering and Research, Volume 3, Issue 1 (2018) 114-119 Contents available at WJTER World Journal of Technology, Engineering and Research Journal Homepage: www.wjter.com

More information

Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective

Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective Mohammad Momani 1, Subhash Challa 1, Khalid Aboura 1 1 University of Technology, Networked Sensors Technologies Lab.

More information

P2P Contents Distribution System with Routing and Trust Management

P2P Contents Distribution System with Routing and Trust Management The Sixth International Symposium on Operations Research and Its Applications (ISORA 06) Xinjiang, China, August 8 12, 2006 Copyright 2006 ORSC & APORC pp. 319 326 P2P Contents Distribution System with

More information

Defense of Trust Management Vulnerabilities in Distributed Networks

Defense of Trust Management Vulnerabilities in Distributed Networks Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Rhode Island, RI 02881

More information

An Approach for Real Time Moving Object Extraction based on Edge Region Determination

An Approach for Real Time Moving Object Extraction based on Edge Region Determination An Approach for Real Time Moving Object Extraction based on Edge Region Determination Sabrina Hoque Tuli Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,

More information

Improving the Performance of the Peer to Peer Network by Introducing an Assortment of Methods

Improving the Performance of the Peer to Peer Network by Introducing an Assortment of Methods Journal of Computer Science 7 (1): 32-38, 2011 ISSN 1549-3636 2011 Science Publications Improving the Performance of the Peer to Peer Network by Introducing an Assortment of Methods 1 M. Sadish Sendil

More information

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Collaborative Multi-Source Scheme for Multimedia Content Distribution Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx

More information

Remote Entrusting of Mobile Multi-Agent Systems

Remote Entrusting of Mobile Multi-Agent Systems Remote Entrusting of Mobile Multi-Agent Systems Kevin Jones kij@dmu.ac.uk http://www.cse.dmu.ac.uk/~kij Re-Trust 08 - Trento, Italy 16 th October 2008 Itinerary Mobile- Agent Systems Remote Entrusting

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

BNTM: Bayesian network based trust model for grid computing

BNTM: Bayesian network based trust model for grid computing International Research Journal of Engineering and Technology (IRJET) e-issn: 95-56 Volume: 4 Issue: Dec-7 www.irjet.net p-issn: 95-7 BNTM: Bayesian network based trust model for grid computing Roya Ghahramani,

More information

On Constraint Problems with Incomplete or Erroneous Data

On Constraint Problems with Incomplete or Erroneous Data On Constraint Problems with Incomplete or Erroneous Data Neil Yorke-Smith and Carmen Gervet IC Parc, Imperial College, London, SW7 2AZ, U.K. nys,cg6 @icparc.ic.ac.uk Abstract. Real-world constraint problems

More information

A Study of Open Middleware for Wireless Sensor Networks

A Study of Open Middleware for Wireless Sensor Networks , pp.105-109 http://dx.doi.org/10.14257/astl.2014.60.26 A Study of Open Middleware for Wireless Sensor Networks Chen-Nam 1, Do-Hyeun Kim 2 1,2 Dept. of Computing Engineering Jeju National University Jeju-Si

More information

Intelligent Transportation Systems Using Short Range Wireless Technologies

Intelligent Transportation Systems Using Short Range Wireless Technologies Journal of Transportation Technologies, 2011, 1, 132-137 doi:10.4236/jtts.2011.14017 Published Online October 2011 (http://www.scirp.org/journal/jtts) Intelligent Transportation Systems Using Short Range

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

Classification of N-Screen Services and its Standardization

Classification of N-Screen Services and its Standardization Classification of N-Screen Services and its Standardization Changwoo Yoon, Taiwon Um, Hyunwoo Lee *Electronics & Telecommunications Research Institute, Daejeon, Korea cwyoon@etri.re.kr, twum@etri.re.kr,

More information

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04

Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 The Design and Implementation of a Next Generation Name Service for the Internet Venugopal Ramasubramanian Emin Gün Sirer SIGCOMM 04 Presenter: Saurabh Kadekodi Agenda DNS overview Current DNS Problems

More information

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,

More information

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029

More information

Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar 4

Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar 4 RESEARCH ARTICLE International Journal of Computer Techniques - Volume 3 Issue 1, Jan- Feb 2015 Load balancing with Modify Approach Ranjan Kumar Mondal 1, Enakshmi Nandi 2, Payel Ray 3, Debabrata Sarddar

More information

DDOS Attack Prevention Technique in Cloud

DDOS Attack Prevention Technique in Cloud DDOS Attack Prevention Technique in Cloud Priyanka Dembla, Chander Diwaker CSE Department, U.I.E.T Kurukshetra University Kurukshetra, Haryana, India Email: priyankadembla05@gmail.com Abstract Cloud computing

More information

Multi-path based Algorithms for Data Transfer in the Grid Environment

Multi-path based Algorithms for Data Transfer in the Grid Environment New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School

More information

Advances in Natural and Applied Sciences. Information Retrieval Using Collaborative Filtering and Item Based Recommendation

Advances in Natural and Applied Sciences. Information Retrieval Using Collaborative Filtering and Item Based Recommendation AENSI Journals Advances in Natural and Applied Sciences ISSN:1995-0772 EISSN: 1998-1090 Journal home page: www.aensiweb.com/anas Information Retrieval Using Collaborative Filtering and Item Based Recommendation

More information

A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme

A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme Yue Zhang, Yunxia Pei To cite this version: Yue Zhang, Yunxia Pei. A Resource Discovery Algorithm in Mobile Grid Computing

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

Query Independent Scholarly Article Ranking

Query Independent Scholarly Article Ranking Query Independent Scholarly Article Ranking Shuai Ma, Chen Gong, Renjun Hu, Dongsheng Luo, Chunming Hu, Jinpeng Huai SKLSDE Lab, Beihang University, China Beijing Advanced Innovation Center for Big Data

More information

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol

Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol Analysis of Worm-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary, Dr Sudhir Agrawal Truba College of Engineering & Technology, Indore, INDIA Abstract MANET is an infrastructure less, dynamic,

More information

Ensuring Secure and Timely Availability of Reputation Data in Peer To Peer Networks

Ensuring Secure and Timely Availability of Reputation Data in Peer To Peer Networks Ensuring Secure and Timely Availability of Reputation Data in Peer To Peer Networks S.Saranya 1, K.Kiruthika Devi 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology,

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

A Survey of Trust Computation Models for Service Management in Internet of Things Systems

A Survey of Trust Computation Models for Service Management in Internet of Things Systems A Survey of Trust Computation Models for Service Management in Internet of Things Systems Abstract Jia Guo, Ing-Ray Chen, and Jeffrey J.P. Tsai* Virginia Tech Department of Computer Science {jiaguo, irchen}@vt.edu

More information

Personal Grid Running at the Edge of Internet *

Personal Grid Running at the Edge of Internet * Personal Grid Running at the Edge of Internet * Bingchen Li 1, Wei Li 1, Zhiwei Xu 1 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, 100080, China Email: {libingchen, liwei,

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN

DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN DETECTING SYBIL ATTACK USING HYBRID FUZZY K-MEANS ALGORITHM IN WSN 1 Shipra Diwakar, 2 Dr. R. Kashyup 1 Research Scholar, 2 HOD ECE Rayat Bahara University Ropar, Punjab ABSTRACT Security in Wireless Sensor

More information

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks

Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks Secure Inter Hop Verification with Onion Protocol Implementation for Reliable Routing In Wireless Networks Nagarajan Ravi #, Jeyanthi. P *2 # Department of Information Technology, Sathyabama University,

More information

Overview of Challenges in VANET

Overview of Challenges in VANET Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because

More information

Integrating Dirichlet Reputation into Usage Control

Integrating Dirichlet Reputation into Usage Control Integrating Dirichlet Reputation into Usage Control Li Yang and Alma Cemerlic University of Tennessee at Chattanooga Cyber Security and Information Intelligence Research Workshop 2009 Motivation of the

More information

Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites

Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites R. Krishnaveni, C. Chellappan, and R. Dhanalakshmi Department of Computer Science & Engineering, Anna University,

More information

Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity Factor in Agent-Based Autonomic Computing System

Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity Factor in Agent-Based Autonomic Computing System J. Software Engineering & Applications, 2009, 2: 03-0 doi:0.4236/sea.2009.2205 Published Online July 2009 (www.scirp.org/ournal/sea) Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity

More information

Using secure multi-party computation when pocessing distributed health data

Using secure multi-party computation when pocessing distributed health data Using secure multi-party computation when pocessing distributed health data Anders Andersen Department of Computer Science Faculty of Science and Technology University of Tromsø 9037 Tromsø, Norway Abstract

More information

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

A METHOD TO DETECT PACKET DROP ATTACK IN MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Routine Scrutiny of an RFID Key Management Scheme for Vehicular Networks

Routine Scrutiny of an RFID Key Management Scheme for Vehicular Networks Routine Scrutiny of an RFID Key Management Scheme for Vehicular Networks SUJEETH T. Dept. of Computer Science &Engineering Sri Venkateswara University,Tirupati Andhra Pradesh, India KIRAN KUMAR REDDY D.

More information

TESTING A COGNITIVE PACKET CONCEPT ON A LAN

TESTING A COGNITIVE PACKET CONCEPT ON A LAN TESTING A COGNITIVE PACKET CONCEPT ON A LAN X. Hu, A. N. Zincir-Heywood, M. I. Heywood Faculty of Computer Science, Dalhousie University {xhu@cs.dal.ca, zincir@cs.dal.ca, mheywood@cs.dal.ca} Abstract The

More information

Spoofing Detection in Wireless Networks

Spoofing Detection in Wireless Networks RESEARCH ARTICLE OPEN ACCESS Spoofing Detection in Wireless Networks S.Manikandan 1,C.Murugesh 2 1 PG Scholar, Department of CSE, National College of Engineering, India.mkmanikndn86@gmail.com 2 Associate

More information

1. Introduction. 2. Discussion On Defense Mechanisms. 2.1 Blacklisting

1. Introduction. 2. Discussion On Defense Mechanisms. 2.1 Blacklisting www.ijcsi.org 296 Study of Reputation Based Defense Mechanism in Peer To Peer Live Streaming Prof. Dr. M.A. Mottalib 1, Md. Ali-Al Mamun 2, Reazul Hoque 3, Md. Ehsanuzzaman 4 and Jonayed Kaysar 5 1,2,3,4,5

More information

Network Traffic Anomaly Detection based on Ratio and Volume Analysis

Network Traffic Anomaly Detection based on Ratio and Volume Analysis 190 Network Traffic Anomaly Detection based on Ratio and Volume Analysis Hyun Joo Kim, Jung C. Na, Jong S. Jang Active Security Technology Research Team Network Security Department Information Security

More information

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology Mobile and Heterogeneous databases Security A.R. Hurson Computer Science Missouri Science & Technology 1 Note, this unit will be covered in two lectures. In case you finish it earlier, then you have the

More information

A Design of Cooperation Management System to Improve Reliability in Resource Sharing Computing Environment

A Design of Cooperation Management System to Improve Reliability in Resource Sharing Computing Environment A Design of Cooperation Management System to Improve Reliability in Resource Sharing Computing Environment Ji Su Park, Kwang Sik Chung 1, Jin Gon Shon Dept. of Computer Science, Korea National Open University

More information

Service-Oriented Advanced Metering Infrastructure for Smart Grids

Service-Oriented Advanced Metering Infrastructure for Smart Grids Journal of Energy and Power Engineering 5 (2011) 455-460 Service-Oriented Advanced Metering Infrastructure for Smart Grids S. Chen 1, J.J. Lukkien 1 and L. Zhang 2 1. Department of Mathematics and Computer

More information

A Static-Dynamic Conjunct Windows Process Integrity Detection Model

A Static-Dynamic Conjunct Windows Process Integrity Detection Model A Static-Dynamic Conjunct Windows Process Integrity Detection Model Fei Chen 1, Yi Li 1, Tong Zhang 1, Kehe Wu 1, 1 North China Electric Power University, Department of Control and Computer Engineering,

More information

A Brief Comparison of Security Patterns for Peer to Peer Systems

A Brief Comparison of Security Patterns for Peer to Peer Systems A Brief Comparison of Security Patterns for Peer to Peer Systems Rahul J. Vaghela 1, Kalpesh Patel 2 1 PG Student, Department of Computer Engineering, L.D. College Of Engineering, Gujarat Technological

More information

Collaborative Framework for Testing Web Application Vulnerabilities Using STOWS

Collaborative Framework for Testing Web Application Vulnerabilities Using STOWS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Emerging Social Networks in Peer-to-Peer Systems

Emerging Social Networks in Peer-to-Peer Systems Emerging Social Networks in Peer-to-Peer Systems Yamini Upadrashta Department of Computer Science University of Saskatchewan 57 Campus Drive Saskatoon, SK S7N 5A9 Canada ysu156@mail.usask.ca Supervisors:

More information

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,

More information

Searching SNT in XML Documents Using Reduction Factor

Searching SNT in XML Documents Using Reduction Factor Searching SNT in XML Documents Using Reduction Factor Mary Posonia A Department of computer science, Sathyabama University, Tamilnadu, Chennai, India maryposonia@sathyabamauniversity.ac.in http://www.sathyabamauniversity.ac.in

More information

Resolving Load Balancing Issue of Grid Computing through Dynamic Approach

Resolving Load Balancing Issue of Grid Computing through Dynamic Approach Resolving Load Balancing Issue of Grid Computing through Dynamic Er. Roma Soni M-Tech Student Dr. Kamal Sharma Prof. & Director of E.C.E. Deptt. EMGOI, Badhauli. Er. Sharad Chauhan Asst. Prof. in C.S.E.

More information

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)

More information

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks

A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework

More information

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH

FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH FEMTOCELL WITH RELAYS TO ENHANCE THE MACROCELL BACKHAUL BANDWIDTH, Abstract In the future of Mobile networks it is important to implement a Femtocell at homes and to improve the domestic network. Even

More information

Max-1: Algorithm for Constructing Tree Topology for heterogeneous networks for Peer-To-Peer Live Video Streaming

Max-1: Algorithm for Constructing Tree Topology for heterogeneous networks for Peer-To-Peer Live Video Streaming International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:16 No:04 14 : Algorithm for Constructing Topology for heterogeneous networks for Peer-To-Peer Live Video Streaming Ammar Waysi AlTuhafi

More information

RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala Spandana* 1, Sesha Bhrgavi 2

RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala Spandana* 1, Sesha Bhrgavi 2 ISSN 2277-2685 IJESR/August 2015/ Vol-5/Issue-8/1126-1134 Teegala Spandana et.al.,/ International Journal of Engineering & Science Research RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala

More information

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture 1 S. Das 2 A. Thakur 3 T. Bose and 4 N.Chaki 1 Department of Computer Sc. & Engg, University of Calcutta, India, soumava@acm.org

More information

Keywords APSE: Advanced Preferred Search Engine, Google Android Platform, Search Engine, Click-through data, Location and Content Concepts.

Keywords APSE: Advanced Preferred Search Engine, Google Android Platform, Search Engine, Click-through data, Location and Content Concepts. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advanced Preferred

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISS: 2456-3307 Hadoop Periodic Jobs Using Data Blocks to Achieve

More information