International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 316

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.3 / 10


     

Comparative Study and Evaluation of Solving Sybil Attack on Peer-To-Peer Network

Anju Shukla, Prachi Damodhar Shahare


Abstract: In computer networks, computing devices allows to exchange data with one another via a data link. Peer-to-peer model (P2P architecture) is a frequently used computer networking architecture in which each workstation, or node, has the same adaptability, capabilities and responsibilities. The idea behind this attack is that a single malicious identity can present multiple identities, and thus gain control over part of the network. Various counter measures to avoid the damages through this attack are considered [3]. The algorithms has already been proposed for mitigating the impact of Sybil attack in peer to peer network, but the detection of Sybil node is only on the sender side. In this paper, the algorithm is introduced which can detect the Sybil node on peer to peer network in both sender as well as receiver side. This will help to identify the malicious node and to maintain the consistency of information on network.


Keywords: Peer-to-Peer P2P, Sybil Attack, security threats, various attacks


Edition: Volume 5 Issue 6, June 2016


Pages: 2620 - 2623


DOI: https://www.doi.org/10.21275/ART20166



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Anju Shukla, Prachi Damodhar Shahare, "Comparative Study and Evaluation of Solving Sybil Attack on Peer-To-Peer Network", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 2620-2623, https://www.ijsr.net/getabstract.php?paperid=ART20166, DOI: https://www.doi.org/10.21275/ART20166



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 12, December 2024

Pages: 448 - 453

Safeguarding IoT Devices Against Emerging Security Threats: Challenges and Mitigation Strategies

Dr. A. Lavanya

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 832 - 839

Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 12, December 2023

Pages: 2074 - 2078

DevSecOps: Integrating Security into the DevOps Pipeline

Dinesh Reddy Chittibala

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024

Pages: 1181 - 1184

Threat Detection in Cloud Banking Using Machine Learning

Ravi Jagadish

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙3

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 11, November 2024

Pages: 309 - 311

The Importance of IT Risk Assessments in Mitigating Risks: A Comparative Analysis of Standards and Supporting Technologies

Sarat Chandra Routhu, Chetan Sharma

Share this Article
Top