Statistical Mechanisms for Detecting Malicious Behaviors in Resource Allocation from Non-cooperative P2P Environments

نویسندگان

  • Haiyang Hu
  • Zhongjin Li
  • LiGuo Huang
  • Hua Hu
چکیده

A Peer-to-Peer (P2P) system relies on the cooperation of the peers and the contributions of their resources. To motivate autonomous peers share their resources, the system needs to support effective resource allocation strategies with respect to peers’ task priorities, and their personal information about valuation. However, peers may tend to be selfish for saving their limited resources and act as the free-riders. Some peers may even be malicious with the goal to do damage to the system. In this paper, we present a bidding based approach for resource allocation to address these issues. We investigate peers’ bidding strategies under different scenarios in terms of probability distributions that peers’ valuations of their prioritized tasks follow in achieving the Nash equilibrium. For resisting the damage to the P2P system brought by malicious peers, we explore different types of malicious behavior and present several statistical mechanisms to detect the malicious peers. The algorithm is also presented for bidders performing their auctions. Finally, we conducted experiments to show the effectiveness of the proposed mechanisms.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

An Anti-cheating Bidding Approach for Resource Allocation in Cloud Computing Environments ?

Cloud computing is a large-scale distributed computing paradigm, which uses a usage-based pricing model to deliver various services and resources on demand to participants globally distributed over the Internet. Cloud computing systems incorporate different types of participants with varied private valuations for resources and multi-priority tasks which should be considered while designing effe...

متن کامل

“Multiagent Systems for Resource Allocation in Peer-to-Peer Systems”

This paper introduces Multiagent Systems (MAS) storage resource allocation algorithms and methods on a Peer-to-Peer (P2P) system of computer storage resources. MAS Complex Adaptive Systems (CAS) based on squirrels behaviors are proposed and evaluated to produce emergent global behaviors that can solve the storage resource allocation problem in a distributed system of peers. Experimental results...

متن کامل

Performance-Based Resource Allocation in Higher Education: A Black Box Containing the Paradox of Increasing Efficiency and Decreasing Productivity

To cope with escalating financial resource limitations from both expanding demands for higher education and experiencing a relatively reduction in public support, higher education units have profoundly adopted a performance-based resource allocation mechanism in recent years. Nevertheless, empirical evaluation findings show that the presumed improvement in performance has not been fulfilled. Us...

متن کامل

A Malicious Peers Detection Framework for Peer-to-Peer Systems

A number of reputation mechanisms are introduced in recent years to alleviate the blindness during peer selection in distributed P2P environment where malicious peers coexist with honest ones. They indeed provide incentives for peers to contribute more resources to the system, and thus, promote the whole system performance. However, little attention has been paid on how to identify the maliciou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. J. Computational Intelligence Systems

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2012