The Open Cybernetics & Systemics Journal

2014, 8 : 371-377
Published online 2014 December 31. DOI: 10.2174/1874110X01408010371
Publisher ID: TOCSJ-8-371

Towards Secured P2P Network: Degenerated Node Identification and Evaluation

Liumei Zhang , Jianfeng Ma , Yichuan Wang and Di Lu
2 South Taibai Road, Xi’an, China. Postcard: 710071.

ABSTRACT

The security improvement of service provided by peer-to-peer (P2P) network has been widely studied. Security issue of P2P is mainly related to the users of P2P services and threat of malicious software. Especially, some malicious softwares could threaten other P2P users and even threaten the security of the entire P2P network. In this paper, based on the analytical hierarchy process, a degenerated node evaluation model has been proposed to evaluate the node resource usage of the P2P network. Moreover, attribute clustering based collaborative filtering algorithm is depicted for calculating the similarities between the identified degenerated node and all the other nodes within a hybrid autonomous cluster. The algorithm utilizes similarity characteristics of node task resource attributes, especially CPU related attributes, to filter redundant data by feature selection. Experiments show that the proposed model and method are feasible and have vital significance for providing decision support and recommendation to the search node. This proposed model is evaluated as being practical for secure computing of P2P network.

Keywords:

Analytical hierarchy process, Collaborative filtering, P2P Network, Network security, Degenerated Node, Pair-Wise Comparison.