DocumentCode :
715372
Title :
Protecting peer-to-peer network with roaming agents
Author :
Banik, Shankar M. ; Urey, Hugh
Author_Institution :
Dept. of Math. & Comput. Sci., Citadel, Charleston, SC, USA
fYear :
2015
fDate :
9-12 April 2015
Firstpage :
1
Lastpage :
6
Abstract :
Peer-to-peer networks are continuously becoming more popular for sharing data and resources. However, a major drawback of this type of network is its ability to maintain security, since there is no centralized server to oversee the network. One way to remedy this problem is through the use of intelligent mobile agents. These agents will act as guards, which will essentially roam the network and periodically check on each node to ensure that it is not under attack. In our previous research, we have proposed algorithms for initial placement of agents in a given peer-to-peer network. As the agents are mobile, the next issue with agent-based security is how the agents should roam around the network to detect attacks. We want the agents to scan the entire network as quickly as possible which will minimize the detection time of attacks. If we run too many agents simultaneously to scan the network, they will consume system resources which will slow down the performance of applications running on the peer-to-peer network. In this paper we have proposed three roaming algorithms for agents. The first algorithm Heavy Scan Algorithm scans the network with minimum time by sacrificing the performance of the application. The second algorithm Light Scan Algorithm takes the maximum time to complete the scan of the entire network with less degradation of the performance of the application. The third algorithm Medium Scan Algorithm balances time to complete the scan with performance of the application. We have illustrated the proposed algorithms with an example. We have also analyzed the complexity of the proposed algorithms.
Keywords :
computational complexity; computer network security; mobile agents; peer-to-peer computing; agent-based security; attack detection time; centralized server; data sharing; heavy scan algorithm; intelligent mobile agents; light scan algorithm; medium scan algorithm; peer-to-peer network; resource sharing; roaming agents; roaming algorithms; Algorithm design and analysis; Complexity theory; Delays; Intrusion detection; Mobile agents; Peer-to-peer computing; agents; intrusion detection; peer-to-peer networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
SoutheastCon 2015
Conference_Location :
Fort Lauderdale, FL
Type :
conf
DOI :
10.1109/SECON.2015.7132990
Filename :
7132990
Link To Document :
بازگشت