Peer-to-Peer [P2P] networks usually has the ability to perform bidirectional communication efficiently, which means both the sending and receiving end has the same transactional power and ability to communicate with one and another. In the modern world, lots of misuses occurred via network schema; now-a-days, most of the malicious activities are held via this kind of P2P data sharing mechanisms, which are held by Botmasters. The botmasters acquire the usage of P2P network and utilize it for their own purposes and make this network to act like malicious one and took the effortness of others. Lots of existing approaches are available, but all are having certain limitations, so a new botnet detection scheme is required to resolve these issues and save the network from this kind of activities, which is called "Scalable Botnet Detection Mechanism". This Scalable Botnet Detection Mechanism initiates its first activity by means of finding the connected systems into the network and make the summary of it. The next step is to manipulate the profile-handling of P2P trafficestimations as well as classify the P2P botnet traffic and legitimate P2P traffic. Simultaneously this system efficiently identifies the performance scenario of the P2P network and makes the system more scalable in further processing. The experimental results proves that our proposed approach is producing the result with more accuracy as well as more scalable than past schemes.
In recent years, penetration of Internet in the world is significantly increased due to technologies that enabled high speed broadband services, social networking and cloud based services. There is considerable increase in the number of users getting connected and hence large amount of user’s vital data are flowing over Internet attracting serious threats and possible attacks from malicious users. To secure this free-flowing data, many security solutions have been presented, validated and implemented. But the majority of them are implemented with traditional networking techniques which itself is complex and hard to manage. This techniques primarily relies on manual configuration of devices which often results in policy conflicts that compromises network’s security. This problem is addressed by Software Defined Networking, which breaks vertical integration by separating the control logic and data forwarding functionality, allowing flexible network architecture, network-wide visibility, simpler network management, etc. OpenFlow is the open standard that enables secure communication between controlling devices and data forwarding devices. In this paper, we propose and validate an approach to implement network-wide firewall in SDN by exploiting capabilities of OpenFlow standard to restrict flow of malicious and suspicious traffic flow in the network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.