Effects of Grey-Hole Attack onP2P Based Video on Demand (VoD) Services

International Journal of Computer Trends and Technology (IJCTT)          
© 2018 by IJCTT Journal
Volume-55 Number-1
Year of Publication : 2018
Authors : Sudipta Majumder, Md. Anwar Hussain


Sudipta Majumder, Md. Anwar Hussain "Effects of Grey-Hole Attack onP2P Based Video on Demand (VoD) Services". International Journal of Computer Trends and Technology (IJCTT) V55(1):1-3, January 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Peer to peer networks are venerable to various types of attacks. These attacks degrade the performance of the P2P based network.in this paper, we have presented the effect of Grey-hole attack especially in the case of BitTorrent based VoD services .we have simulatedGrey-hole attacks and studied the effect of anumber of malicious nodes in apeer network of various swarm sizes. The number of attacking nodes taken was 1, 2, and 3 whereas the size of swarms was 10, 20 and 30. Also, another important parameter taken into consideration for studying the effect was thetotal number of seeders. We have taken observation for attack simulations for various scenarios depending upon swarm size, numbers of seeder and number of attack nodes.

[1] Peer-to-Peer Working Group, Bidirectional Peer-to-Peer communication with interposing Firewalls and NATs, White Paper, 2001.
[2] R. Steinmetz and K. Wehrle, peer to peer Systems and applications, (Eds) Springer LNCS 3485, 2006.
[3] Kannan, Jayanthkumar,and LakshmiNarayanan, Karthik, “Implications of Peer-to-Peer Networks on Worm Attacks and Defenses”, CS294-4 Project,Fall 2003, For Computer Science Dept. of Berkley University.
[4] Castro, M., Druschel, P, Ganesh, A., Rowstron, A. and Wallach, D.S., “Secure routing for structured peer-to-peer overlaynetworks", In Proceedings of USENIX Operating System Design and Implementation (OSDI), Boston, MA, Dec. 2002.
[5] Engle, Marling, “Vulnerabilities of P2P Systems and a Critical look at Their Solutions”, April 2006.
[6] Yu, Wei, Boyer, Corey, Chellappan, Sriram and Xuan, Dong, “Peer-to-Peer System-based Active Worm Attacks: Modeling and Analysis”, In Proc. of IEEE International Conference on Communications (ICC), pp. 295-300, May 2005.
[7] Yolum, Pinar, Singh and Munindar P., “Flexible Caching in Peer-to-Peer Information Systems”, In Proceedings of the 4th International Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS), Bologna, July 2002.
[8] Stading, Tyron, Maniatis, Petros and Baker, Mary, “Peer-to-Peer Caching Schemes to Address Flash Crowds (2002)”, In1stInternational Peer To Peer Systems Workshop (IPTPS 2002).
[9] Douceur, John R., “The Sybil Attack”, In Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS ’02), Cambridge, Massachusetts, USA, March. 2002.
[10] S.Majumder, A.Hussain, "how to increase per-session throughput in distress hours if grey hole attack is in-avertible”, ISSN(online): 2277- 128X, IJARCSSE, Volume 4, Issue 11, November 2014.

Grey hole attack, seeders, swarm, tracker, leecher, BitTorrent, Video-on-demand, peer to peer network,throughput,first chunk download time, last chunk download finish time.