7. Conclusions
In this paper, we mainly discussed how to detect malicious peers using outlier mining approach in hybrid P2P networks. We first presented several definitions, and described a peer’s behavior patterns based on the peer’s interaction data. Then, we detailed the local frequent behavior pattern mining process and the global frequent behavior pattern producing approach by incrementally propagating and aggregating the local frequent behavior patterns. Based on the local frequent patterns and the global frequent patterns, we depicted the malicious node detection process and the examples of using our model. The simulation results indicated that our model could effectively detect malicious behavior, such as collusion, Sybil and file polluter. In our future work, we will focus our efforts on both the settings of keys used to perform frequent behavior pattern mining and the application of our model in other types of P2P networks.