Investigation analysis to find the security vulnerabilities in DHT oriented peer to peer network | IEEE Conference Publication | IEEE Xplore