Peer-to-peer's most wanted: Malicious peers

نویسندگان

  • Loubna Mekouar
  • Youssef Iraqi
  • Raouf Boutaba
چکیده

In this paper, we propose a reputation management scheme for partially decentralized peer-to-peer systems. The reputation scheme helps to build trust among peers based on their past experiences and feedback from other peers. Two selection advisor algorithms are proposed for helping peers to select the most trustworthy peer to download from. The proposed algorithms can detect malicious peers sending inauthentic files. The Malicious Detector Algorithm is also proposed to detect liar peers that send the wrong feedback to subvert the reputation system. The new concept of Suspicious Transactions is introduced and explained. Simulation results confirm the capability of the proposed algorithms to effectively detect malicious peers and isolate them from the system, hence reducing the amount of inauthentic uploads, increasing peers’ satisfaction, and preserving network resources.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges

The main reason behind the success of Peer-to-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems do not provide a desirable solution for P2P networks to store peer reputation information. Though a centralized system does exist, it is prone to Sybil attack that can significantly red...

متن کامل

Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model

A malicious peer’s behavior is one of the most challenging research areas of the P2P world. Our previous reputation-based trust model approach, which is based on the resource chain model (RCM), prevents malicious peers from spreading malicious contents among the open community. Moreover, a study on the malicious behavior over P2P community leads us to recognize a malicious node. The purpose of ...

متن کامل

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

A Reputation-based Trust Management in Peer-to-Peer Network Systems

Peer-to-peer networks have gained a lot of attention over the last couple of years, mainly due to the popularity of the free multimedia file-sharing program Napster and a legal battle around it. Being open by nature P2P systems represent an ideal environment for various types of malicious intrusions. The problem of securing hosts on P2P network while keeping the openness of the system has been ...

متن کامل

A Query Learning Routing Approach Based on Semantic Clusters

Peer-to-peer systems have recently a remarkable success in the social, academic, and commercial communities. A fundamental problem in Peer-to-Peer systems is how to efficiently locate appropriate peers to answer a specific query (Query Routing Problem). A lot of approaches have been carried out to enhance search result quality as well as to reduce network overhead. Recently, researches focus on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 50  شماره 

صفحات  -

تاریخ انتشار 2006