Behavior-based reputation management in P2P file-sharing networks
نویسندگان
چکیده
منابع مشابه
Reputation-Based Trust Management for P2P Networks
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we describe a reputationbased trust management protocol for P2P networks where users rate the reliability of parties they deal with, and share this information with their peers. The protocol helps establishing trust among good peers as well as identifying the malicio...
متن کاملMobile File-Sharing over P2P Networks
Peer-to-peer (P2P) computing is a networking and distributed computing paradigm which allows the sharing of computing resources and services by direct, symmetric interaction between computers. With the advance in mobile wireless communication technology and the increasing number of mobile users, peer-to-peer computing, in both academic research and industrial development, has recently begun to ...
متن کاملInterconnecting Unstructured P2P File Sharing Networks
Currently there are a lot of public P2P file sharing networks in existence. Some of them have millions of users. There is a need for a system that can search and download from every P2P network. This article describes a novel structured interconnection system that works over multiple unstructured P2P file sharing networks and provides additional management features. This system works across dif...
متن کاملControlling P2P File-Sharing Networks' Traffic
Since the appearance of Peer-To-Peer (P2P) file-sharing networks some time ago, many Internet users have chosen this technology to share and search programs, videos, music, documents, etc. The total number of P2P file-sharing users has been increasing and decreasing in the last decade depending on the creation or end of some well known P2P file-sharing systems. P2P file-sharing networks traffic...
متن کاملEigenRep: Reputation Management in P2P Networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic files. We describe an algorithm to decrease the number of downloads of i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer and System Sciences
سال: 2012
ISSN: 0022-0000
DOI: 10.1016/j.jcss.2011.10.021