Sei sulla pagina 1di 4

Neighbor Similarity Trust against Sybil Attack in P2p

E-Commerce

ABSTRACT

In this paper is based on networking to predict an trust to establish Peer to peer (P2P)
e-commerce Electronic commerce or ecommerce is a term for any type of business, or
commercial transaction, that involves the transfer of information across the Internet
applications exist at the edge of the Internet with vulnerabilities to passive and active
attacks. The attacks occur using interactions between the trading peers as a transaction
takes place. In this paper, we propose Sybil attack, an active attack, it means some
data is missing in transferring the data from one place to another place this is called
active attack. And passive attack means data is not missing in transferring the data
from one place to another place this is called passive attack. a central authority control
is used in existing system. In our proposed system two techniques we are using Sybil
trust central authority control and Homogeneous configuration. In our approach,
duplicated Sybil attack peers can be identified as the neighbor peers become
acquainted and hence more trusted to each other. Security and performance analysis
shows that Sybil attack can be minimized by our proposed neighbor similarity trust.
Each peer has an identity, which is either honest or Sybil.
EXISTING SYSTEM PROPOSED SYSTEM
EXISTING CONCEPT: - PROPOSED CONCEPT: -
 In Existing system was concentrates on social  In Proposed system are establish. In this paper,
networks and trusted certification, has not we focus on the active attacks in P2P e-
been able to prevent Sybil attack peers from commerce.
doing transactions
 Our work exploits the neighbor similarity trust  When a peer is compromised, all the
relationship to address Sybil attack restriction information will be extracted.
helps to bind the number of peers against any
additional attack among the neighbors.
EXISTING TECHNIQUE:- PROPOSED TECHNIQUE: -
 Sybil Central Authority  Computation cost.
 Homogeneous Configuration.
TECHNIQUE DEFINITION: TECHNIQUE DEFINITION:-
 Sybil attacks have appeared in many scenarios,  In this paper, the principal building block of
with wide implications for security, safety and Sybil-trust approach is the identifier distribution
trust. process.
 For example, an internet poll can be rigged  In the approach, all the peers with similar
using multiple IP addresses to submit a large behavior in a group can be used as identifier
number of votes. source.
DRAWBACKS: ADVANTAGES:-
 Data inconsistency to be unvested by network  Time consumption is determined by the process
is not validating. of Sybil trust
 Time interval was sustained by means of  Ensure the peer connection to establish attack
misintersection process. detection.
APPLICATIONS
 E-Commerce Web sites.
 http://www.storehippo.com/.

HARDWARE REQUIREMENTS
 Processor : Pentium iv 2.6 GHZ, Intel core 2 duo.
 Ram : 512 mb ram
 Monitor : 15” color
 Hard disk : 40 GB

SOFTWARE REQUIREMENTS
 Front End : JAVA (SWINGS)
 Back End : MY SQL 5.5
 Operating System : Windows 07
 IDE : Eclipse
PROPOSED SYSTEM FUTURE ENCHANCEMENT

PROPOSED CONCEPT: - FUTURE CONCEPT : -


 In Proposed system are establish. In this paper,  Future enhancement of this paper was to W
we focus on the active attacks in P2P e- presented Sybil Trust, a defense against Syb
commerce. attacking P2P e-commerce. Compared to oth
approaches, our approach is based on neighborhoo
similarity trust in a group P2P e-commerc
community.
 In this project future what we have done mea
 When a peer is compromised, all the
admin upload the products what type means usef
information will be extracted.
for public database users.

PROPOSED TECHNIQUE: - FUTURE TECHNIQUE: -


 Homogeneous Configuration.  Border Gateway Protocol (BGP)
TECHNIQUE DEFINITION:- TECHNIQUE DEFINITION:-
 In this paper, the principal building block of  In this project future what we have done mean
Sybil-trust approach is the identifier distribution admin upload the products what type means usef
process. for public database users.

 In the approach, all the peers with similar


behavior in a group can be used as identifier
source.
ADVANTAGE:- EXTRAVAGANCE :-
 Time consumption is determined by the process  Business or transactions conducted direct
of Sybil trust
between a company and consumers who are th
 Ensure the peer connection to establish attack
end-users of its products or services.
detection.

Potrebbero piacerti anche