Peer-To-Peer Network Security

International Journal of Computer Science and Engineering
© 2014 by SSRG - IJCSE Journal
Volume 1 Issue 5
Year of Publication : 2014
Authors : Mrs. Padmapriya .G

How to Cite?

Mrs. Padmapriya .G, "Peer-To-Peer Network Security," SSRG International Journal of Computer Science and Engineering , vol. 1,  no. 5, pp. 1-4, 2014. Crossref,


Peer to Peer networks in general refers to the setup in which all computers have equal status. In other way, this allows communication between two systems, where each system is considered equal. Peer-to-peer networking is an alternative to the client-server model. Under the peer-to-peer model, each system is both a server and a client, commonly referred to as a servant. Recently, however, peer- to- peer networks have gained momentum with searchable peer-to-peer network file databases, increased network connectivity, and content popularity. In this article, will discuss the malicious threats, privacy concerns.


Malicious threats, privacy concerns, and peer-to-peer model.


[1] Rüdiger Schollmeier, A Definition of Peer-to- Peer Networking for the Classification of Peer-to-Peer Architectures and Applications, Proceedings of the First International Conference on Peer-to-Peer Computing, IEEE (2002). .
[2] D. Barkai, Peer-to-Peer Computing, Intel Press, 2002. .
[3 ] Oram, A. (Ed.). (2001). Peer-to-peer: Harnessing the Benefits of a Disruptive Technologies. O'Reilly Media, Inc. .
[4] Host Software, S. Crocker, IETF Working Group (April 7, 1969) .
[5] Berners-Lee, Tim (August 1996). "The World Wide Web:Past,Present,Future". Retrieved 5 November 2011. .
[6] Steinmetz, R., & Wehrle, K. (2005). 2. What Is This "Peer-to-Peer" About? (pp. 9-16). Springer Berlin Heidelberg.
[7] Walker, Leslie (2001-11-08). "Uncle Sam Wants Napster" The Washington Post. Retrieved 2010-05-22.