Research Article | Open Access | Download PDF
Volume 55 | Number 1 | Year 2018 | Article Id. IJCTT-V55P101 | DOI : https://doi.org/10.14445/22312803/IJCTT-V55P101
Effects of Grey-Hole Attack onP2P Based Video on Demand (VoD) Services
Sudipta Majumder, Md. Anwar Hussain
Citation :
Sudipta Majumder, Md. Anwar Hussain, "Effects of Grey-Hole Attack onP2P Based Video on Demand (VoD) Services," International Journal of Computer Trends and Technology (IJCTT), vol. 55, no. 1, pp. 1-3, 2018. Crossref, https://doi.org/10.14445/22312803/IJCTT-V55P101
Abstract
Peer to peer networks are venerable to various types of attacks. These attacks degrade the performance of the P2P based network.in this paper, we have presented the effect of Grey-hole attack especially in the case of BitTorrent based VoD services .we have simulated Grey-hole attacks and studied the effect of a number of malicious nodes in a peer network of various swarm sizes. The number of attacking nodes taken was 1, 2, and 3 whereas the size of swarms was 10, 20 and 30. Also, another important parameter taken into consideration for studying the effect was the total number of seeders. We have taken observation for attack simulations for various scenarios depending upon swarm size, numbers of seeder and number of attack nodes.
Keywords
Grey hole attack, seeders, swarm, tracker, leecher, BitTorrent, Video-on-demand, peer to peer network, throughput, first chunk download time, last chunk download finish time
References
[1] Peer-to-Peer Working Group, Bidirectional Peer-to-Peer communication with interposing Firewalls and NATs, White Paper, 2001.
[2] R. Steinmetz and K. Wehrle, peer to peer Systems and applications, (Eds) Springer LNCS 3485, 2006.
[3] Kannan, Jayanthkumar, and Lakshmi Narayanan, Karthik, “Implications of Peer-to-Peer Networks on Worm Attacks and Defenses”, CS294-4 Project, Fall 2003, For Computer Science Dept. of Berkley University.
[4] Castro, M., Druschel, P, Ganesh, A., Rowstron, A. and Wallach, D.S., “Secure routing for structured peer-to-peer overlay networks", In Proceedings of USENIX Operating System Design and Implementation (OSDI), Boston, MA, Dec. 2002.
[5] Engle, Marling, “Vulnerabilities of P2P Systems and a Critical look at Their Solutions”, April 2006.
[6] Yu, Wei, Boyer, Corey, Chellappan, Sriram and Xuan, Dong, “Peer-to-Peer System-based Active Worm Attacks: Modeling and Analysis”, In Proc. of IEEE International Conference on Communications (ICC), pp. 295-300, May 2005.
[7] Yolum, Pinar, Singh and Munindar P., “Flexible Caching in Peer-to-Peer Information Systems”, In Proceedings of the 4th International Bi-Conference Workshop on Agent-Oriented Information Systems (AOIS), Bologna, July 2002.
[8] Stading, Tyron, Maniatis, Petros and Baker, Mary, “Peer-to-Peer Caching Schemes to Address Flash Crowds (2002)”, In1stInternational Peer To Peer Systems Workshop (IPTPS 2002).
[9] Douceur, John R., “The Sybil Attack”, In Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS ’02), Cambridge, Massachusetts, USA, March. 2002.
[10] S.Majumder, A.Hussain, "how to increase per-session throughput in distress hours if grey hole attack is in-avertible”, ISSN(online): 2277- 128X, IJARCSSE, Volume 4, Issue 11, November 2014.