Title :
Protecting peer-to-peer networks from the denial of service attacks
Author :
Vadivu, G. Senthil ; Gomathi, C. ; Priya, A. Swathy
Author_Institution :
Anna Univ. of Technol., Trichirappalli, India
Abstract :
The purpose of this paper is to reduce the Denial of Service (DoS) attacks on peer-to-peer networks by hiding the position of the file and to prove the effectiveness through the fuzzy logic. In general to protect the files in the serverless distributed file systems from the attacker, we have to maintain large number of copies of the original file that leads to storage overhead. This paper presents location hiding approach that needs only minimum number of copies of file. The location hiding approach uses Location Key and routing guard. We use chord protocol to implement peer-to-peer system. We use fuzzy logic to develop a graph that provides better performance of the Location hiding approach.
Keywords :
computer network security; data encapsulation; distributed databases; fuzzy logic; network operating systems; peer-to-peer computing; chord protocol; denial of service attacks; distributed file system; file protection; fuzzy logic; location hiding approach; location key; peer-to-peer network protection; peer-to-peer system; routing guard; Computer crime; File systems; Law; Peer to peer computing; Protocols; Servers; Denial of Service attacks; Serverless Distributed File System; chord protocol; fuzzy logic; location hiding; performance;
Conference_Titel :
Electronics Computer Technology (ICECT), 2011 3rd International Conference on
Conference_Location :
Kanyakumari
Print_ISBN :
978-1-4244-8678-6
Electronic_ISBN :
978-1-4244-8679-3
DOI :
10.1109/ICECTECH.2011.5941751