Title :
Different-Strategy Management of Malicious Nodes in the Peer-to-Peer Network
Author :
Cai, Muyong ; Wen, Xiangming ; Zheng, Wei ; Cheng, Yinbo ; Sun, Yong
Author_Institution :
Inst. of Commun. Network Integrated Tech., Beijing Univ. of Posts & Telecommun., Beijing, China
Abstract :
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes wastes of the network. In this paper, we first introduce the existing ways of handling malicious nodes in the peer-to-peer network and then present a better approach dealing with malicious nodes which has a better performance than before.
Keywords :
computer viruses; message authentication; peer-to-peer computing; telecommunication security; different-strategy management; malicious node; peer-to-peer network; security threat; unauthentic data spread; virus data; Aggregates; Computer viruses; Conference management; Environmental management; History; Information security; Network servers; Peer to peer computing; Technology management; Uncertainty; malicious; p2p; trust;
Conference_Titel :
Environmental Science and Information Application Technology, 2009. ESIAT 2009. International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-0-7695-3682-8
DOI :
10.1109/ESIAT.2009.325