Shailesh D. Kamble

Work place: Yeshawantrao Chavan College of Engineering/Department of Computer Science and Engineering, Nagpur, 441110, India

E-mail: shailesh_2kin@rediffmail.com

Website:

Research Interests: Natural Language Processing, Network Architecture, Network Security, Image Processing

Biography

Shailesh D. Kamble received Master of Engineering degree from Prof Ram Meghe Institute of Technology and Research, formerly known as College of Engineering, Badnera under Sant Gadge Baba Amravati University, Amravati, India. Presently, he is Ph.D. candidate in department of Computer Science and Engineering from G.H. Raisoni College of Engineering (An Autonomous Institution Affiliated to Rashtrasant Tukdoji Maharaj Nagpur University), Nagpur, India. He is currently working as an associate professor at Yeshwantarao Chavan College of Engineering, Nagpur. His current research interests include image processing, network security, video processing and language processing. He is the author or co-author of more than 40 scientific publications in International Journal, International Conferences, and National Conference.

Author Articles
Detection and Mitigation of Sybil Attack in Peer-to-peer Network

By Arpita M. Bhise Shailesh D. Kamble

DOI: https://doi.org/10.5815/ijcnis.2016.09.08, Pub. Date: 8 Sep. 2016

Peer-to-peer networks are widely used today. Due to this wide use, they are the target of many attackers. The most mentionable of them is the Sybil attack. This is an attack in which it creates many fake identities. In this paper, the detection scheme and efficient mitigation mechanism to counteract Sybil attack in the peer-to-peer network is proposed. The proposed Sybil detection scheme is used to detect Sybil attack. The detection of Sybil attack is depending upon the behavior of the packets. The identity and the location of the packet are checked. If the location and identity of the packet are changed than that of the mentioned, the packet is detected as a Sybil attack. Sybil mitigation scheme is the combination of cost incurred method and certified authentication method. The Sybil packet will be removed by closing read/write operations. The proposed scheme is evaluated on the basis of detection rate and false positive rate. The experimental results show that Sybil attack is accurately detected by the proposed system in terms of low false positive rate and high detection rate. Moreover, the proposed system works efficiently in terms of Sybil detection rate and false positive rate.

[...] Read more.
Other Articles