Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
|
|
|
- Adela Wood
- 9 years ago
- Views:
Transcription
1 Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu Abstract. Reputation systems help peers decide whom to trust before undertaking a transaction. Conventional approaches to reputation-based trust modeling assume that peers reputed to provide trustworthy service are also likely to provide trustworthy feedback. By basing the credibility of a peer s feedback on its reputation as a transactor, these models become vulnerable to malicious nodes that provide good service to badmouth targeted nodes. We propose to decouple a peer s reputation as a service provider from its reputation as a service recommender, making the reputation more robust to malicious peers. We show via simulations that a decoupled approach greatly enhances the accuracy of reputations generated, resulting in fewer malicious transactions, false positives, and false negatives. 1 Introduction The explosive growth in the Internet in the last decade has resulted in an increase in the use and popularity of online peer-to-peer (P2P) communities. P2P file sharing communities like Gnutella [9] involve millions of users who interact daily to transfer files among each other free of cost. The success of this type of a P2P community relies on cooperation amongst all the peers in the community. However, peers are anonymous and can act in their self-interests. This open and anonymous nature makes the network difficult to police and vulnerable to a variety of attacks. A number of attacks can interfere with the operation of a P2P system. One common attack is the whitewashing attack where a free-riding node repeatedly joins the network under a new identity in order to avoid the penalties imposed on free-riders [8]. A more serious type of attack is when malicious peers exploit file sharing networks to distribute viruses and Trojan horses. The VBS.Gnutella worm, for example, stores trojan executables in network nodes. Mandragore, a Gnutella worm, registers itself as an active peer in the network, and in response to intercepted queries, provides a renamed copy of itself for download [5]. Peers also need to detect inauthentic file attacks, in which corrupted or blank files are passed off as legitimate files. Hence, it is necessary for P2P communities to combat these threats by motivating cooperation and honest participation within their network. Reputation systems help address this need by establishing a trust mechanism that helps peers decide whom to trust before undertaking a transaction. A number of reputation systems have been proposed or deployed in practice. While systems like ebay use a centralized approach [7], a number of decentralized reputation systems encourage cooperation and punish malicious behavior. These systems, within the bounds of their assumptions, demonstrate the ability to significantly reduce the number of malicious transactions in a P2P system [5, 1, 3, 6, 10, 12].
2 A central challenge in building a reputation system is to make it robust to misleading or unfair feedback. Malicious peers can subvert the reputation system by assigning poor reputation ratings to honest peers and good ratings to other malicious peers. To cope with malicious feedback, most existing reputation systems incorporate into their trust model the notion of correlated trust: peers reputed to provide trustworthy service, in general, will likely provide trustworthy feedback. Consequently, in these models the credibility of a peer s feedback is weighed by its reputation as a service provider. While useful as a simple defense against malicious ratings, the correlated trust assumption can easily fail or be manipulated. A peer providing honest service can be incentivized to give false feedback about other peers service. Similarly, colluding malicious nodes can offer honest service for the express purpose of boosting their reputations so they can badmouth the peers they are attacking. This paper offers three key contributions. First, we propose a peer-to-peer reputation system that increases robustness against fake and misleading feedback by decoupling service and feedback reputations. Second, we show via simulation how our reputation system drastically reduces the rate of malicious transactions in a P2P system. Finally, we compare our scheme against correlated trust models in existing reputation systems. Our simulations show that strategic peers can exploit correlated trust models to increase malicious transactions, false positives and false negatives in the system. Our decoupled reputation system significantly reduces all of these behaviors. The remainder of the paper is organized as follows. Related work is discussed in Section 2. In Section 3, we discuss our decoupled trust model and present our reputation system. In Section 4, we present our simulation settings and performance evaluation. Finally, Section 5 concludes the paper with suggested future work. 2 Related Work Reputation management involves several components, including trust modeling, data storage, communication and reputation safeguards. Most research efforts have focused on solving only specific reputation management issues such as reputation storage, communication or attack safeguards [5, 6, 12]. ebay, the largest person-to-person auction site, uses a reputation-based trust scheme where, after each transaction, buyers and sellers rate each other using the Feedback Forum [7]. Reputation profiles are designed to predict future performance and help users decide whom to transact with [13]. ebay, however, uses a central authority to manage all communication and coordination between peers, essentially eliminating much of the complexity present in decentralized systems. Aberer and Despotovic propose a decentralized reputation system for P2P networks where data is stored on a P-Grid [1]. Their system assumes most network peers are honest, and reputations in the system are expressed as complaints. Though the method works well, it is not at all robust to dynamic peer personalities. EigenTrust [10] is a reputation system for P2P networks that attempts to combat the spread of inauthentic files. Each peer is associated with a global trust value that reflects the experiences of all other peers in the network with the target peer. Peers use these trust values to choose who they download from, as a consequence, the community
3 identifies and isolates malicious peers from the network. The limitation of EigenTrust is that it assumes the existence of pre-trusted peers in the network. While the systems mentioned so far assume a correlation between service and feedback reputations, a few have actually developed separate metrics for evaluating service trust and feedback trust [14, 2]. PeerTrust [14] is a reputation framework that includes an adaptive trust model. To decouple feedback trust from service trust, peers use a personalized similarity measure to more heavily weigh opinions of peers who have provided similar ratings for a common set of past partners. In a large P2P system, however, finding a statistically significant set of such past partners is likely to be difficult. As a consequence, peers will often have to make choices among a set of candidates for which there is no information. CONFIDANT [2] attacks the problem of false ratings using a Bayesian approach in a mobile ad-hoc network. They distinguish between reputation, how well a node behaves in routing and trust, and how well it behaves in the reputation system. A node distributes only first-hand information to other nodes, and only accepts other first-hand information if those opinions are similar (within a threshold) to its own opinion. Compared to this system where a node s referral is interpreted subjectively per node, our proposal produces a system-wide referrer rating per node. Our proposal is also generalizable to any environment using a reputation system. Previous trust models do not provide a general model for decoupling service trust and feedback trust. In this paper, we propose a reputation system in which each peer is associated with two trust values: one for its role as a service provider in the P2P network, and the other for its role as a service recommender in the reputation system. 3 The Trust Model Our reputation system associates with each peer two sets of reputation ratings: an aggregated service rating (s-rating) and an aggregated feedback rating (f-rating). Additionally, the system maintains for each peer a list of peers that has rated it and its rating. Service ratings are normalized values ranging from -1.0 to 1.0 with 0 indicating a neutral rating. Feedback ratings are normalized values that range from 0 to 1.0 with 1.0 indicating a good rater. Initially, the s-rating is set to 0, and the f-rating is set to 1.0 for all peers. Consider a peer, A, that queries for a file. In order to make a decision on which responding peer to transact with, A chooses the peer with the highest aggregated service rating. While this can result in an unbalanced load distribution in the network, a probabilistic approach can be employed to distribute load [10]. After finishing a transaction with a service provider, B, A provides to B either a rating of -1 (unsatisfactory) or 1 (satisfactory) depending on the outcome. This rating is weighed by f-rating(a), i.e. the feedback rating of A. This implies that A needs to be well-reputed as a feedback provider in order for its opinions to have an effect on B s service reputation. That is, the feedback from those peers with higher feedback trust ratings will be weighed more than those with lower feedback ratings. At the end of the transaction, A also needs to send feedback rating updates to all peers that had rated B earlier. If A received good (or bad) service from B, it provides a rating of 1 to all the peers that rated B as good (or bad) prior to the transaction.
4 A C B D Service Rating Feedback Rating First hand Service Fig. 1. Decoupling service and feedback reputation: after interacting with B, peer A modifies B s service reputation, but also modifies the feedback reputations of B s previous raters C and D. This rating is in turn weighed by A s feedback rating. In the case that the outcome of A s transaction with B did not match with a prior service rating, A assigns a feedback rating of 0 to the originator of the rating. This process is shown in Figure 1, where peer A interacts with B, updates B s service reputation, and updates the feedback ratings of C and D, who contributed to B s service reputation. Consequently, the service trust value and feedback trust value of a peer, u, denoted by s-rating(u) and f-rating(u), are defined as: s-rating(u) = α s-rating(u) + β (r u f-rating(i)) f-rating(u) = 1 n u n u i=1 f u f-rating(i) where r u indicates a service rating of -1 or 1; f u is the feedback rating which can be 0 or 1 depending on malicious feedback or helpful feedback; n u represents the total number of transactions that have made use of u s feedback; and α and β are normalized weight factors, between 0 and 1, used to exponentially decay reputation ratings. Peers can exhibit dynamic personalities, i.e. they are honest at times and dishonest at others. For example, once a peer has established a good reputation in the network, it can abuse it. Also, honest peers can be subverted at any time and begin behaving badly. Hence, peer reputations must be representative of more recent behavior rather than old ratings. Our model follows previous models in exponentially decaying reputation to weigh recent feedback more heavily than older feedback. This allows reputations to become negative if a node becomes malicious, or recover if a formerly malicious node becomes honest. Furthermore, a dynamic system also allows honest nodes to recover from poor ratings given by malicious nodes. In our model, we do not explicitly define how reputations and records of ratings are stored. The issue of reputation storage is orthogonal to our problem of decoupling reputation. Different storage models would not impact our reputation accuracy. In a self-storing model, peers can compute and maintain their own reputations, storing them along with ratings signed by raters. Another option is to store each peer s reputations away from the peer. For example, Eigentrust [10] and P-Grid [1] use distributed hash tables to determine where individual reputations are stored in the P2P system.
5 4 Performance Evaluation We first evaluate the effectiveness of our method for limiting malicious behavior, then compare our approach to conventional correlated trust approach. Our results show not only a decrease in the number of malicious transactions, but also a significant reduction in the number of false positives and negatives reported. To limit storage and communication overhead, we use a time window so that only records of a peer s transactions within the window are stored. Only the most recent service ratings are stored and feedback rating updates are only applied to those peers who rated a node recently. This reduces the communication costs associated with updating feedback ratings. The storage and communication costs of our reputation system are reasonable and justified given its significant benefits. 4.1 Simulation Environment We implement our simulations in C using tools built on the Stanford Graph Base (SGB) [11]. The SGB platform represents a peer community and takes a peer model and topology graphs generated from the GT-ITM Topology Generator [4]. Table 1 summarizes the main parameters used and their default values. Parameter Value Range Nominal Value Number of peers in the network Percentage of honest peers Peer Model Percentage of malicious peers Number of strategic peers Percentage of peers responding to a query request Simulation Number of query cycles in one experiment Number of experiments over which results are averaged 5 5 Table 1. Simulation Parameters Our network simulation proceeds in cycles. For simplicity, we assume that every peer in the network makes one transaction in each query cycle. We model the distribution of files and query responses using a Zipf distribution. Finally, P2P file sharing networks are often clustered by content categories. We assume only one content category in our implementation with file popularities defined to follow a Zipf distribution. Our peer model involves three types of behavior patterns in the network, namely, honest, dishonest and strategic. Honest peers are truthful in providing service and feedback while dishonest peers provide incorrect service and incorrect feedback. Strategic peers are opportunistic peers that try to exploit the correlated trust model to spread bad information. They either provide good service and dishonest feedback or bad service and honest feedback. We vary the percentage of strategic peers in our experiments to illustrate the benefits of using our approach in scenarios where honest peers could report dishonest feedback about others, and vice versa.
6 Number of malicious transactions With Trust Model Without Trust Model Number of malicious transactions With Trust Model Without Trust Model Thousand transactions Fig. 2. Measuring malicious transactions in a network with and without our reputation model (40% nodes are malicious) Percentage of malicious peers Fig. 3. Measuring malicious transactions in a network with and without our reputation model (Number of transactions is 50,000). Our first set of experiments evaluates the effectiveness of our reputation system at detecting malicious behavior compared to conventional correlated trust. Each result presented is an average of five randomized runs, and the standard deviation is less than 2%. 4.2 Effectiveness against Malicious Behavior We set the number of malicious peers to 40% in a network of 500 peers. On the x-axis, the number of transactions ranges from 50,000 to 300,000. As seen in Figure 2, without a reputation system, an increase in the number of transactions results in a corresponding increase in the number of malicious transactions. However, our trust model results in a significant reduction in the number of bad transactions in the system. After about 100,000 transactions, the number of malicious transactions is close to constant. Figure 3 shows results for a similar experiment, but instead of varying the total number of transactions, varies the number of malicious peers in the network. We perform the test for 50,000 transactions over 500 peers, and vary the percentage of malicious peers from 10% to 70%. As seen in the figure, the number of malicious transactions is substantially lower when a trust model is employed. When a small percentage of network peers are malicious, they are easily detected and avoided, resulting in a very low number of malicious transactions. However, as malicious nodes become the majority (> 50%) they begin to overwhelm honest nodes, resulting in a significant increase in malicious transactions. This result demonstrates the natural collusion between dishonest nodes that form a network majority. 4.3 Benefits of Decoupling Service and Feedback Trust In our second set of experiments, we evaluate the benefits of our approach compared to the conventional approach of correlating service trust and feedback trust. In the correlated approach, ratings assigned to the service provider at the end of a transaction are weighed only by the service rating of the rater. That is, the feedback from those peers with higher service ratings will be weighed more than those with lower service ratings. We set the number of transactions to 50,000 for 500 peers. We first evaluate the number of malicious transactions using both approaches in a network with only static peer personalities. Honest peers always provide honest service and feedback, and dishonest peers always provide malicious service and feedback. We vary the percentage of
7 Number of malicious transactions Decoupled Approach Conventional Approach Number of malicious transactions Decoupled Approach Conventional Approach Percentage of malicious peers Fig. 4. Malicious transactions in networks with a conventional trust model and our decoupled model (50,000 transactions) Percentage of strategic peers Fig. 5. Malicious transactions in networks with a conventional trust model and our decoupled model (40% malicious nodes, the percentage of strategic nodes varies). Percentage of false positives and negatives 100 Decoupled Approach Conventional Approach Percentage of strategic peers Fig. 6. False positives and negatives in a network with a conventional trust model and our decoupled model (40% malicious nodes, the percentage of strategic nodes varies). malicious peers in the network from 10% to 70%. As seen in Figure 4, both approaches perform well in reducing the total number of malicious transactions, with our model generally being more accurate. When peers exhibit static personalities, the assumption that a honest peer will provide honest feedback holds true. Hence, correlated trust-based reputation models work as well as our decoupled model. We introduce strategic behavior in our second experiment. Malicious peers may try to rig the system by providing honest service and feedback in some cases but dishonest feedback in others. Similarly, honest peers may, at times, give malicious feedback or service to some peers due to jealousy or competition. We use a network with 40% malicious peers who will provide both bad service and bad feedback. We vary the percentage of strategic peers from 10% to 60%, with the remaining nodes being totally honest. Half of the strategic peers provide good service as a service provider and malicious feedback as a service recommender. The other half provide bad service but honest feedback. Figure 5 demonstrates that our decoupled approach significantly outperforms the conventional approach in reducing the number of malicious transactions. While strategic peers take advantage of the correlated trust assumption in conventional systems to spread incorrect ratings, our decoupled model correctly identifies nodes as malicious service providers or sources of malicious feedback.
8 In our last experiment, we demonstrate how our decoupled trust model reduces the number of false positives and negatives reported in the P2P network. False positives and negatives represent the amount of false information fed into the reputation system. Such disinformation are the source of malicious transactions and are difficult to remove, once inserted. Again, we use a network with 40% malicious nodes, and vary the percentage of strategic peers in the network from 10% to 60%. As seen in Figure 6, our decoupled approach results in significantly fewer false positives and negatives than the conventional model. We note that the relatively high numbers of false reports are due to the high number (40%) of initial malicious nodes in these network setups. 5 Conclusions and Future Work We have proposed a reputation-based trust model that improves accuracy by removing the assumption of correlation between service quality and feedback quality. The model decouples trust associated with each peer based on the role it plays, both as a service provider and as a service recommender. This decoupled approach incorporates reputations of both the service provider and the requester in the computation of trust values and, in this way, makes our model more robust to peer maliciousness. Our results report fewer false positives and negatives in the system as compared to the conventional approach of correlating the trust values. As ongoing work, we are building a more sophisticated trust model and working towards safeguarding our system from collusion. References 1. ABERER, K., AND DESPOTOVIC, Z. Managing trust in a Peer-2-Peer information system. In Proc. of CIKM (Atlanta, GA, USA, Nov. 2001). 2. BUCHEGGER, S., AND BOUDEC, J. L. A robust reputation system for P2P and mobile ad-hoc networks. In Proc. of the 2nd P2PEcon Workshop (June 2004). 3. BURTON, K. Design of the openprivacy distributed reputation system, May CALVERT, K. L., DOAR, M. B., AND ZEGURA, E. W. Modeling internet topology. IEEE Communications Magazine 35, 6 (June 1997), DAMIANI, E., DI VIMERCATI, D. C., PARABOSCHI, S., SAMARATI,P.,AND VIOLANTE, F. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proc. of CCS (Nov. 2002). 6. DEWAN, P., AND DASGUPTA, P. Pride: Peer-to-Peer reputation infrastructure for decentralized environments. In Proc. of WWW (May 2004). 7. EBAY. ebay home page, FELDMAN, M., PAPADIMITRIOU,C., CHUANG, J., AND STOICA, I. Free-riding and whitewashing in peer-to-peer systems. In Proc. of WEIS (May 2004). 9. GNUTELLA. The gnutella protocol specification v0.4, KAMVAR, S. D., SCHLOSSER, M. T., AND GARCIA-MOLINA, H. The eigentrust algorithm for reputation management in P2P networks. In Proc. of WWW (May 2003). 11. KNUTH, D.E.The Stanford GraphBase: A Platform for Combinatorial Computing OOI, B.C.,LIAU, C.Y.,AND TAN, K.-L. Managing trust in peer-to-peer systems using reputation-based techniques. In Proc. of WAIM (August 2003). 13. RESNICK, P., AND ZECKHAUSER, R. Trust among strangers in internet transactions: Empirical analysis of ebay s reputation system. Advances in Applied Microeconomics 11 (Jan. 2001). 14. XIONG, L., AND LIU, L. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. on Knowledge and Data Engineering 16, 7 (2004).
A Reputation Management System in Structured Peer-to-Peer Networks
A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
R-Chain: A Self-Maintained Reputation Management System in P2P Networks Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasgupta Dept. of Computer Science & Engineering Arizona State University Tempe, AZ
A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems
A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba University of Waterloo, Waterloo, Canada {lmekouar, iraqi, rboutaba}@bbcr.uwaterloo.ca
ONLINE REPUTATION SYSTEMS
ONLINE REPUTATION SYSTEMS YUYE WANG 1 CPSC 557: Sensitive Information in a Wired World Professor: Joan Feigenbaum Date: 12 Nov, 2013 Identity Reput ation Trust 2 TRUST SYSTEM Trust system, guide people
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
Maximum Likelihood Estimation of Peers Performance in P2P Networks
Maximum Likelihood Estimation of Peers Performance in P2P Networks Zoran Despotovic, Karl Aberer EPFL - Swiss Federal Institute of Technology Lausanne, Switzerland email:{zoran.despotovic, karl.aberer}@epfl.ch
ASecure Hybrid Reputation Management System for Super-Peer Networks
ASecure Hybrid Reputation Management System for Super-Peer Networks Ghassan Karame Department of Computer Science ETH Zürich 892 Zürich, Switzerland karameg@infethzch Ioannis T Christou Athens Information
A Reputation-Based Trust Management System for P2P Networks
A Reputation-Based Trust Management System for P2P Networks Ali Aydın Selçuk Ersin Uzun Mark Reşat Pariente Department of Computer Engineering Bilkent University Ankara, 68, Turkey E-mail: [email protected],
A reputation-based trust management in peer-to-peer network systems
A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science Iowa State University Ames, Iowa 50011 USA {
Reputation Management in P2P Networks: The EigenTrust Algorithm
Reputation Management in P2P Networks: The EigenTrust Algorithm by Adrian Alexa supervised by Anja Theobald 1 Introduction Peer-to-Peer networks is a fast developing branch of Computer Science and many
Costs and Benefits of Reputation Management Systems
Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy [email protected]
Trust and Reputation Management in Distributed Systems
Trust and Reputation Management in Distributed Systems Máster en Investigación en Informática Facultad de Informática Universidad Complutense de Madrid Félix Gómez Mármol, Alemania ([email protected])
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
TREMA: A Tree-based Reputation Management Solution for P2P Systems
163 TREMA: A Tree-based Reputation Management Solution for P2P Systems Quang Hieu Vu ETISALAT BT Innovation Center (EBTIC) Khalifa University, UAE [email protected] Abstract Trust is an important aspect
Trust and reputation in file-sharing Peer-to-Peer systems
TDDC03 Projects, Spring 2004 Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu, Xianying Cheng Supervisor: Claudiu Duma Trust and reputation in file-sharing Peer-to-Peer systems Peng Mu,
Trust and Reputation Management
Trust and Reputation Management Omer Rana School of Computer Science and Welsh escience Centre, Cardiff University, UK Omer Rana (CS, Cardiff, UK) CM0356/CMT606 1 / 28 Outline 1 Context Defining Trust
Sybilproof Reputation Mechanisms
Sybilproof Reputation Mechanisms Alice Cheng Center for Applied Mathematics Cornell University, Ithaca, NY 14853 [email protected] Eric Friedman School of Operations Research and Industrial Engineering
An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System
An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System Takuya Nishikawa and Satoshi Fujita Department of Information Engineering, Hiroshima University Kagamiyama 1-4-1, Higashi-Hiroshima,
Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks
1 Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Department of Electrical and
Hedaquin: A reputation-based health data quality indicator
STM 2007 Hedaquin: A reputation-based health data quality indicator Ton van Deursen a,b, Paul Koster a, Milan Petković a a Philips Research Eindhoven, The Netherlands b Université du Luxembourg, Luxembourg
A Survey of Attack and Defense Techniques for Reputation Systems
A Survey of Attack and Defense Techniques for Reputation Systems KEVIN HOFFMAN Purdue University DAVID ZAGE Purdue University CRISTINA NITA-ROTARU Purdue University Reputation systems provide mechanisms
A Survey of Attack and Defense Techniques for Reputation Systems
A Survey of Attack and Defense Techniques for Reputation Systems Kevin Hoffman, David Zage, and Cristina Nita-Rotaru Department of Computer Science and CERIAS, Purdue University 305 N. University St.,
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks
1 Reputation Management Framework and its use as Currency in Large-Scale Peer-to-Peer Networks Rohit Gupta and Arun K. Somani Dependable Computing and Networking Laboratory Department of Electrical and
A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network
A Fuzzy Approach for Reputation Management using Voting Scheme in Bittorrent P2P Network Ansuman Mahapatra, Nachiketa Tarasia School of Computer Engineering KIIT University, Bhubaneswar, Orissa, India
Dynamic Reputation Based Trust Management Using Neural Network Approach
www.ijcsi.org 161 Dynamic Reputation Based Trust Management Using Neural Network Approach Reza Azmi 1 Mahdieh Hakimi 2, and Zahra Bahmani 3 1 College of Engineering, Alzahra University 2 College of Engineering,
Detection of Collusion Behaviors in Online Reputation Systems
Detection of Collusion Behaviors in Online Reputation Systems Yuhong Liu, Yafei Yang, and Yan Lindsay Sun University of Rhode Island, Kingston, RI Email: {yuhong, yansun}@ele.uri.edu Qualcomm Incorporated,
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections
A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department
Reputation Rating Mode and Aggregating Method of Online Reputation Management System *
Reputation Rating Mode and Aggregating Method of Online Reputation Management System * Yang Deli ** Song Guangxing *** (School of Management, Dalian University of Technology, P.R.China 116024) Abstract
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Alliatrust: A Trustable Reputation Management Scheme for Unstructured P2P Systems
Alliatrust: A Trustable Reputation Management Scheme for Unstructured P2P Systems Jeffrey Gerard, Hailong Cai, and Jun Wang Computer Science & Engineering, University of Nebraska Lincoln {jgerar, hcai,
Research Article AuthenticPeer: A Reputation Management System for Peer-to-Peer Wireless Sensor Networks
International Journal of Distributed Sensor Networks Volume 215, Article ID 637831, 11 pages http://dx.doi.org/1.1155/215/637831 Research Article : A Reputation Management System for Peer-to-Peer Wireless
A Review on Trust and Reputation for Web Service Selection
A Review on Trust and Reputation for Web Service Selection Yao Wang, Julita Vassileva Department of Computer Science University of Saskatchewan {yaw181, jiv}@cs.usask.ca Abstract A trust and reputation
Weighted Graph Approach for Trust Reputation Management
Weighted Graph Approach for Reputation Management K.Thiagarajan, A.Raghunathan, Ponnammal Natarajan, G.Poonkuzhali and Prashant Ranjan Abstract In this paper, a two way approach of developing trust between
Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:
Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks
Counteracting free riding in Peer-to-Peer networks q
Available online at www.sciencedirect.com Computer Networks 52 (2008) 675 694 www.elsevier.com/locate/comnet Counteracting free riding in Peer-to-Peer networks q Murat Karakaya *, _ Ibrahim Körpeoğlu,
Network Security Validation Using Game Theory
Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy
Trust-based Service Management for Social Internet of Things Systems
Trust-based Service Management for Social Internet of Things Systems Ing-Ray Chen, Fenye Bao, and Jia Guo Abstract A social Internet of Things (IoT) system can be viewed as a mix of traditional peer-to-peer
Reputation Management using Trust based Decision making System through Temporal and correlation analysis
Reputation Management using Trust based Decision making System through Temporal and correlation analysis V.Raja Gopal 1,S.Sumathi 2, Asst.Professor, Dept of Information Technology, Sri Krishna Engineering
Peer to peer networks: sharing between peers. Trond Aspelund
Peer to peer networks: sharing between peers Trond Aspelund Abstract In this literature survey we look at peer-to-peer networks. We first see how peer-to-peer networks distinguish themselves from the client/server
