An investigation into peer-to-peer network security using Wireshark

Book chapter


Ahmad Musa, Aliyu Abubakar, Usman Abdul Gimba and Rasheed Abubakar Rasheed 2019. An investigation into peer-to-peer network security using Wireshark. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.
AuthorsAhmad Musa, Aliyu Abubakar, Usman Abdul Gimba and Rasheed Abubakar Rasheed
Abstract

Peer-to-peer networks' ability to be used as
the primary vector of delivery in a highly sensitive
environment poses many dangers. The impacts of the
hazards on security can be measured when using peer-topeer
networks in a standard computing environment. The
transfer of data across multiple network data-centers
exposes the system to a potential insider threat, remote
control, and the possible leak of private and confidential
information. In this paper, we present an analysis of peerto-
peer network security. This follows a description of
existing techniques to prevent potential threats to peer-to peer networks and finally the paper presents a proposed
technique to enhance the security of peer-to-peer networks
using simulation based experimental study.

KeywordsWireshark; Peer-to-peer networks; Sensitive; Insider threats; Datacenters
Year2019
Book title2019 15th International Conference on Electronics, Computer and Computation (ICECCO)
PublisherIEEE
Output statusPublished
ISBN9781728151601
9781728151595
9781728151618
Publication dates
Online2019
Publication process dates
Deposited23 Jan 2023
Digital Object Identifier (DOI)https://doi.org/10.1109/ICECCO48375.2019.9043236
Official URLhttps://ieeexplore.ieee.org/document/9043236
Permalink -

https://repository.canterbury.ac.uk/item/939y9/an-investigation-into-peer-to-peer-network-security-using-wireshark

  • 44
    total views
  • 0
    total downloads
  • 44
    views this month
  • 0
    downloads this month

Export as

Related outputs

Functional and performance analysis of discrete event network simulation tools
Musa, A. and Awan, I. 2022. Functional and performance analysis of discrete event network simulation tools. Simulation Modelling Practice and Theory. 116, p. 102470. https://doi.org/10.1016/j.simpat.2021.102470
The case for validating ADDIE model as a digital forensic model for peer to peer network investigation
Musa, A., Awan, I-U and Zarah, F. 2022. The case for validating ADDIE model as a digital forensic model for peer to peer network investigation. Information System Frontiers. https://doi.org/10.1007/s10796-022-10360-8
Machine learning for intrusion detection and network performance
Ibrahim Abobaker and Ahmad Musa 2021. Machine learning for intrusion detection and network performance. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)
Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation
Ahmad Musa, Irfan-Ullah Awan and Ibrahim Abobaker 2021. Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud) IEEE.
Self regulated learning in flipped classrooms: A systematic literature review
Rasheed Abubakar Rasheed, Amirrudin Kamsin, Nor Aniza Abdullah, Habeebah Adamu Kakudi, Auwal Shehu Ali, Ahmad Musa and Adamu Sani Yahaya 2020. Self regulated learning in flipped classrooms: A systematic literature review. International Journal of Information and Education Technology. 10 (11). https://doi.org/10.18178/ijiet.2020.10.11.1469
Transfer learning based histopathologic image classification for burns recognition
Aliyu Abubakar, Hassan Ugail, Ali Maina Bukar, Ali Ahmad Aminu and Ahmad Musa 2019. Transfer learning based histopathologic image classification for burns recognition. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.