By Topic

iDetect: An immunity based algorithm to detect harmful content shared in Peer-to-Peer networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jian-Ming Lv ; Sch. of Comput. Sci. & Eng., South China Univ. of Technol., Guangzhou, China ; Zhi-Wen Yu ; Tie-Ying Zhang

A huge amount of harmful and illegal contents such as child pornography and abuse video are shared in Peer-to-Peer (P2P) network and have brought some serious social problems. Traditional detection algorithms monitor and analyze the content of the P2P traffic by deploying centralized powerful servers. The immense amount of sharing, transferring and frequently updating files content in P2P network makes these techniques quite cost-expensive and inefficient to detect the harmful elements in time. We develop the iDetect, a distributed harmful content detection algorithm inspired by the Clonal Selection mechanism of the immune system. Analogous to the B-lymphocytes secreting antibodies against antigens in human bodies, the clients in the P2P network deployed with the iDetect cooperate to detect the harmful content in a distributed and self-organized manner. Experiments show that the algorithm is efficient, effective, scalable to locate the clients sharing harmful content in the P2P network.

Published in:

Machine Learning and Cybernetics (ICMLC), 2011 International Conference on  (Volume:2 )

Date of Conference:

10-13 July 2011