New Metrics for Reputation Management in P2P Networks



Similar documents
New Metrics for Reputation Management in P2P Networks

Graph Mining and its applications to Reputation Management in Networks

Reputation Management in P2P Networks: The EigenTrust Algorithm

An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System

Personalized Reputation Management in P2P Networks

Distance Degree Sequences for Network Analysis

Trust and Reputation Management

A Reputation Management Scheme for Peer-to-Peer Networks based on the EigenTrust Trust Management Algorithm

Personalized Reputation Management in P2P Networks

Trust and Reputation Management in Distributed Systems

Spam Detection with a Content-based Random-walk Algorithm

Sybilproof Reputation Mechanisms

Research Article AuthenticPeer: A Reputation Management System for Peer-to-Peer Wireless Sensor Networks

Dynamic Trust Management for Mitigation of Malware Dissemination in P2P Networks

Simulating a File-Sharing P2P Network

Reputation Management Algorithms & Testing. Andrew G. West November 3, 2008

A reputation-based trust management in peer-to-peer network systems

A Reputation Management System in Structured Peer-to-Peer Networks

Methods for Web Spam Filtering

Spam Host Detection Using Ant Colony Optimization

A Reputation-Based Trust Management System for P2P Networks

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System

Topical Authority Identification in Community Question Answering

A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems

EigenSpeed: Secure Peer-to-peer Bandwidth Evaluation

A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems

R-Chain: A Self-Maintained Reputation Management System in P2P Networks

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles are freely available online:

Users Collaboration as a Driver for Reputation System Effectiveness: a Simulation Study

Enhancing the Ranking of a Web Page in the Ocean of Data

Super-Consumer Based Reputation Management for Web Service Systems

Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks*

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems

Practical Graph Mining with R. 5. Link Analysis

Subordinating to the Majority: Factoid Question Answering over CQA Sites

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Using Peer to Peer Dynamic Querying in Grid Information Services

Know your Neighbors: Web Spam Detection using the Web Topology

Link-Based Similarity Search to Fight Web Spam

A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems

Costs and Benefits of Reputation Management Systems

Web Graph Analyzer Tool

Fuzzy Logic Techniques for Reputation Management in Anonymous Peer-to-Peer Systems


A STUDY REGARDING INTER DOMAIN LINKED DOCUMENTS SIMILARITY AND THEIR CONSEQUENT BOUNCE RATE

Dynamic Reputation Based Trust Management Using Neural Network Approach

Peer-to-Peer Research at Stanford

ASecure Hybrid Reputation Management System for Super-Peer Networks

IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS

Comparison of Ant Colony and Bee Colony Optimization for Spam Host Detection

Analyzing Download Time Performance of University Websites in India

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

Maximum Likelihood Estimation of Peers Performance in P2P Networks

Peer to peer networks: sharing between peers. Trond Aspelund

QUANTITATIVE TRUST MANAGEMENT: QuanTM, Reputation, and PreSTA. Andrew G. West PRECISE Meeting 11/18/2009

Online Fraud Detection Model Based on Social Network Analysis

ONLINE REPUTATION SYSTEMS

A Data-Driven Framework for Dynamic Trust Management

..not just for anymore. Let s do the math.. w Assume 500M searches/day on the web w All search engines combined w Assume 5% commercially viable

Collaborative Spam Filtering Using Networks

Weighted Graph Approach for Trust Reputation Management

Graph Processing and Social Networks

Balanced Reputation Detective System (BREDS): Proposed Algorithm

ICTR Cloud Efforts developing canonical SIGINT analytics, finding hard targets and exploratory data analysis at scale

PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Combating Web Spam with TrustRank

Trust Management Towards Service-Oriented Applications

Part 1: Link Analysis & Page Rank

Semantic Search in Portals using Ontologies

Alliatrust: A Trustable Reputation Management Scheme for Unstructured P2P Systems

MailRank: Using Ranking for Spam Detection

A Game Theoretical Framework for Adversarial Learning

An Alternative Web Search Strategy? Abstract

Trend Micro Endpoint Comparative Report Performed by AV Test.org

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS

SocioPath: In Whom You Trust?

Combating Web Spam with TrustRank

A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections

SIP Service Providers and The Spam Problem

The JXP Method for Robust PageRank Approximation in a Peer-to-Peer Web Search Network

How To Encrypt Data With A Power Of N On A K Disk

A Random-Walk Based Scoring Algorithm with Application to Recommender Systems for Large-Scale E-Commerce

Fraudulent Support Telephone Number Identification Based on Co-occurrence Information on the Web

A Point-Based Incentive Scheme for P2P Reputation Management Systems

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2

Extracting Link Spam using Biased Random Walks From Spam Seed Sets

Computer Networks - CS132/EECS148 - Spring

Reputation Management Service for Peer-to-Peer Enterprise Architectures

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

An Analysis on Distribution of Malicious Packets and Threats over the Internet

degrees of freedom and are able to adapt to the task they are supposed to do [Gupta].

Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik

MATTEO RIONDATO Curriculum vitae

RepTrap: A Novel Attack on Feedback-based Reputation

LIST OF FIGURES. Figure No. Caption Page No.

Reputation Management: Experiments on the Robustness of ROCQ

Virtual Landmarks for the Internet

Removing Web Spam Links from Search Engine Results

SECURITY RISK ANALYSIS AND EVALUATION OF INTEGRATING CUSTOMER ENERGY MANAGEMENT SYSTEMS INTO SMART DISTRIBUTION GRIDS

Transcription:

New for Reputation in P2P Networks D. Donato, M. Paniccia 2, M. Selis 2, C. Castillo, G. Cortesi 3, S. Leonardi 2. Yahoo!Research Barcelona Catalunya, Spain 2. Università di Roma La Sapienza Rome, Italy 3. Consorzio Università Industria, Radiolabs, University of Rome, Tor Vergata Rome, Italy

2 3 4 5

2 3 4 5

Traditional Peer to Peer Networks A type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving the others.

features V Resource sharing: bandwidth, storage space, and computing power V Information sharing V Lack of central authority X Lack of guarantee and certification of the shared resources

Downside The open and anonymous nature of opens doors to manipulation of the services (information) provided

Downside The open and anonymous nature of opens doors to manipulation of the services (information) provided The open and anonymous nature of makes it difficult to calculate reliable quality metrics for peers and objects

Reputation management Reputation management is used to: Describe the performance of peers in the network Describe how reliable they are

Reputation management Reputation management is used to: Describe the performance of peers in the network Describe how reliable they are Such mechanisms should be robust against malicious peers.

Starting point EigenTrust We start with EigenTrust [Kamvar et al., 23], an algorithm designed for reputation management in file sharing application over p2p networks. The main idea is to combine this algorithm with metrics of reputation computed using techniques recently introduced for detecting and demoting Web Spam.

Contribution We adapt Truncated PageRank [Becchetti et al., 26], Estimation of Supporters [Palmer et al., 22] and BadRank in reputation management We introduce a number of new threat models We test existing and new threat models in a simulated environment We show that our combined approaches perform better than EigenTrust alone in reducing the amount of inauthentic downloads

2 3 4 5

EigenTrust Applications of EigenTrust for reputation management (using a DHT to record transaction outcomes never allow a peer to do its own evaluation), but also online communities

EigenTrust Definition of local trust in EigenTrust We define a local trust value s ij as s ij = sat(i, j) unsat(i, j). In order to avoid malicious peers to assign arbitrarily high local trust values, it is necessary to normalize them. The normalized local trust value is c ij is defined as follows: cij = max(s ij, ) j max(s ij, ).

EigenTrust Hypothesis Peers who are honest about the files they provide are also likely to be honest in reporting their local trust values.

EigenTrust Global trust The idea of transitive trust, inspired by PageRank [Page et al., 998], leads to a system where trust values propagate through paths along the network

PageRank PageRank can be expressed as a weighted summation of paths of varying lengths S = t= damping(t) P t. N t: the lengths of the paths. damping(t): decreasing function of t. P: row-normalized citation matrix

Truncated PageRank Proposed in [Becchetti et al., 26]. Idea: reduce the direct contribution of the first levels of links: damping(t) = { t T Cα t t > T

Truncated PageRank Proposed in [Becchetti et al., 26]. Idea: reduce the direct contribution of the first levels of links: damping(t) = { t T Cα t t > T V No extra reading of the graph after PageRank

Estimation of supporters Target page Propagation of bits using the OR operation Count bits set to estimate supporters

Estimation of supporters Target page Propagation of bits using the OR operation Count bits set to estimate supporters [Becchetti et al., 26] shows an improvement of ANF algorithm [Palmer et al., 22] based on probabilistic counting [Flajolet and Martin, 985]. After d iterations, the bit vector associated to any page x provides information about the number of supporters of x at distance d. This algorithm can be used to estimate the number of different peers contributing to the ranking of a given peer.

BadRank If a page links to another page with a high BadRank, then also this page should be considered a page with negative characteristics. The difference with respect to PageRank is that BadRank is not based on the evaluation of inbound links of a web page but on its outbound links. br(i) = d i j br(j) + ( d)e(i) indeg(j) computed on the graph of negative evaluations

2 3 4 5

Network Models Transaction Network A link from a node (peer) i to a node j is inserted every time i downloads a file from j. Each link is weighted with a positive value if the downloaded file was authentic, negative otherwise. Positive Opinion Network A link is inserted from a node i to a node j only after the download of authentic files. Inverse Network The transpose of the positive opinion network.

Threat Model A (individuals) and B (collective)

Threat Model C - collectives with camouflage They provide good files sometimes

Threat Model D Have a set of nodes providing good ratings for them

Threat Model G - malicious smart model Sometimes give ratings to the rest of the network

Threat Model H - malicious smart model with camouflage Sometimes provide authentic files and ratings to the rest of the network

2 3 4 5

Eigentrust with Inverse Eigentrust - Model D Encourage peers to provide ratings about other peers Require: EigenTrust score vector ET, Inverse EigenTrust score vector I : if I [i] > then 2: return ET [i] 3: else 4: return 5: end if

Eigentrust with Inverse Eigentrust - Model G Encourage peers to provide many ratings about other peers Require: EigenTrust score vector ET, Inverse EigenTrust score vector I, threshold tr = ET [i] i N : if I [i] tr then 2: return ET [i] 3: else 4: return 5: end if

EigenTrust with Truncated PageRank Malicious peers receive positive values from the other members of the coalition (malicious and spy). This means that the most of the trust mass is propagated starting from nodes at few hops of distance. Require: Eigentrust score vector ET, Truncated PageRank vector P, threshold tr : if P[i] tr then 2: return ET [i] 3: else 4: return 5: end if

EigenTrust with Estimation of Supporters Malicious peers supporters necessarily belong to the same coalition. This means that a malicious peer obtain an high reputation because of the great number of supporters at short distance from it. The Bit Propagation algorithm can be used to perform an analysis of the connectivity of the transition network in order to detect local anomalies. Require: EigenTrust score vector ET, Bit Propagation vector BP, threshold tr : if BP[i] tr then 2: return ET [i] 3: else 4: return 5: end if

Badness Propagating badness If i trusts j and j distrusts k then, with high probability, also i should regard k as untrustworthy. We can define the Global Badness as: negt = D T where D is the normalized negative opinion matrix and T is the EigenTrust Rank. Each peer i has a global Badness given by n negt i = negc ji T j j=

Average BadRank for models A-D Average BadRank after 25 and 5 cycles.

Dishonesty The badness is able to differentiate between good and malicious peers but it does not help in discovering spies. We measure dishonesty: dishonesty i = j P negt j where P is the set of peers that i have given positive ratings The dishonesty is high for all those peers which give good ratings to peers with high badness.

Average dishonesty for models A-D Average Dishonesty after 25 and 5 cycles.

2 3 4 5

Settings good peers 5 pre-trusted peers probability to supply corrupted files equals to 2% for good peers

Settings good peers 5 pre-trusted peers probability to supply corrupted files equals to 2% for good peers We consider the average ratio between the number of inauthentic downloads and the total number of downloads

Comparison Inauthentic downloads for threat model D (malicious and spies) and threat model G (plus smartness)

A (individuals) and B (collective) EigenTrust, E. + TruncatedPR, E. + badness + dishonesty

Threat model C (camouflage) and D (spies) EigenTrust, E. + TruncatedPR, E. + badness + dishonesty

Threat model G (smart) and H (smart+camouflage) EigenTrust, E. + TruncatedPR, E. + badness + dishonesty

Variant: provide bad files, but be honest Threat model A,C

Variant: provide bad files, but be honest; combined attacks Threat model D+A,D+C

What s next We have discussed several threat models and tools

What s next We have discussed several threat models and tools Find more general threat models (not easy!)

What s next We have discussed several threat models and tools Find more general threat models (not easy!) Propose more tools that increase the cost of attacks and/or make them less successful

What s next We have discussed several threat models and tools Find more general threat models (not easy!) Propose more tools that increase the cost of attacks and/or make them less successful Propose techniques that can adapt to different environments (e.g.: learn how hostile is the network currently, behave accordingly)

What s next We have discussed several threat models and tools Find more general threat models (not easy!) Propose more tools that increase the cost of attacks and/or make them less successful Propose techniques that can adapt to different environments (e.g.: learn how hostile is the network currently, behave accordingly)

What s next We have discussed several threat models and tools Find more general threat models (not easy!) Propose more tools that increase the cost of attacks and/or make them less successful Propose techniques that can adapt to different environments (e.g.: learn how hostile is the network currently, behave accordingly) Thank you!

http://ewwws.com/pr/przero.php. PR - Google s PageRank Penalty. Becchetti, L., Castillo, C., Donato, D., Leonardi, S., and Baeza-Yates, R. (26). Using rank propagation and probabilistic counting for link-based spam detection. In Proceedings of the Workshop on Web Mining and Web Usage Analysis (WebKDD), Pennsylvania, USA. ACM Press. Flajolet, P. and Martin, N. G. (985). Probabilistic counting algorithms for data base applications. Journal of Computer and System Sciences, 3(2):82 29. Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. (23). The eigentrust algorithm for reputation management in p2p networks. In WWW, pages 64 65.

Page, L., Brin, S., Motwani, R., and Winograd, T. (998). The PageRank citation ranking: bringing order to the Web. Technical report, Stanford Digital Library Technologies Project. Palmer, C. R., Gibbons, P. B., and Faloutsos, C. (22). ANF: a fast and scalable tool for data mining in massive graphs. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 8 9, New York, NY, USA. ACM Press.