期刊文献+

P2P声誉系统中GoodRep攻击及其防御机制 被引量:4

GoodRep Attack and Defense in P2P Reputation Systems
下载PDF
导出
摘要 声誉系统由于其聚集评价的特点,为恶意节点提供了可乘之机.一些恶意节点合谋形成GoodRep攻击组,相互虚假夸大,进而在高声誉值的掩饰下危及P2P网络安全.提出了GoodRep的攻击模型及其防御机制——RatingGuard,并给出了该机制的数学描述和模块化实现过程.RatingGuard通过分析推荐节点之间的评价行为相似度,对推荐节点进行聚类划分和异常检测,识别出存在的GoodRep攻击组节点,从而帮助声誉系统排除GoodRep攻击组的干扰.仿真结果表明,RatingGuard在GoodRep攻击组的抵制方面效果显著,有效提高了声誉系统在面对GoodRep攻击时的恶意节点检测率. Reputation systems are playing critical roles in P2P networks as a method to assess the trustworthiness of peers and to combat malicious peers. However, the characteristic of aggregating ratings makes reputation systems vulnerable to be abused by false ratings, and thus offering opportunities for malicious peers. They can conspire with each other to form a collusive clique and unfairly increase the reputation of them. Under the cover of high reputation, malicious peers can masquerade as trusted ones and violate P2P networks arbitrarily. This attack model, called GoodRep, is described in this paper. In order to defend against GoodRep attack, the RatingGuard scheme is proposed to secure P2P reputation systems. This scheme is built with three functional modules. DC, DP and AD. The data collection (DC) module supports the collection of the previous rating data among raters. The data processing (DP) module measures the rating similarity of raters~ activities by analyzing these data. To identify GoodRep cliques, the abnormal detection (AD) module detects the abnormalities through clustering partition technology. The experimental results show that our RatingGuard scheme is effective in suppressing GoodRep attack, and the reputation system with RatingGuard gains higher detection ratio of malicious peers compared with the traditional schemes.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第8期1473-1480,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60573048 60773135 90718007)
关键词 P2P 信任 声誉 GoodRep攻击 合谋欺骗 peer-to-peer trust reputation GoodRep attack collusive
  • 相关文献

参考文献16

  • 1Granville Z, Rose M, Panisson A, et al. Managing computer networks using peer-to-peer technologies [J]. IEEE Communications Magazine, 2005, 43(10): 62-68.
  • 2金瑜,古志民,班志杰.一种新的P2P系统中基于双ratings的声誉管理机制[J].计算机研究与发展,2008,45(6):942-950. 被引量:12
  • 3Adar E, Huberman B. Freeriding on gnutella [J]. FirstMonday, 2000, 5 (10):42-68.
  • 4Singh A, Castro A, Druschel, et al. Defending against eclipse attacks on overlay networks [C] //Proc of the llth Workshop on ACM SIGOPS Europen Workshop. New York: ACM, 2004:115-120.
  • 5Feldman M, Papadimitriou C, Chuang J, et al. Free-riding and whitewashing in peer-to-peer systems [C]//Proc of ACM SIGCOMM. New York: ACM, 2004:228-236.
  • 6Doueeur J R. The sybil attack [C] //Proc of the 1st Int Workshop on Peer-to-Peer Systems. Berlin: Springer, 2002: 251-260.
  • 7Yang Y, Feng Q, Sun Y L, et ak Reptrap: A novel attack on feedback-based reputation systems [C] //Proc of 4th Int zonf on Security and Privacy in Communication Networks. New York: ACM, 2008.
  • 8Hoffman K, Zage D, Nita-Rotaru C. A survey of attack and defense techniques for reputation System [J]. ACM Computing Surveys, 2009, 41(1) :1-31.
  • 9Kamvar S, Schlosser M. The eigentrust algorithm for reputation management in P2P networks [C]//. Proe of the 12th Int World Wide Web Conf (WWW2003). New York: ACM, 2003: 123-134.
  • 10Zhou R, Hwang K. PowerTrust: A robust and scalable reputation system for trusted P2P computing [J]. IEEE Trans on Parallel and Distributed Systems, 2007, 18 (7): 460-473.

二级参考文献54

  • 1常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301-1307. 被引量:101
  • 2李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 3石志国,贺也平,张宏.一种对等计算安全性的时间自衰减信任管理算法[J].计算机研究与发展,2007,44(1):1-10. 被引量:21
  • 4JUN S, AHAMAD M, XU J. Robust information dissemination in uncooperative environments, distributed computing systems[A]. Proceedings 25th IEEE International Conference, ICDCS 2005[C]. 2005.
  • 5SARWAR B, KARYPIS G,KONSTAN J, et al. Item-based collaborative filtering recommendation algorithms[A]. Proceedings of the 10th International Conference on World Wide Web[C]. 2001.285-295.
  • 6SARWAR B M, KARYPIS G, KONSTAN J A, et al. Application of dimensionality reduction in recommender system: a case study[A]. ACM Web KDD 2000 Workshop[C]. 2000.
  • 7AGGARWAL C C. On the effects of dimensionality reduction on high dimensional similarity search[A]. ACM PODS Conference[C]. 2001.
  • 8STOICA I, MORRIS R, KARGER D, et al.Chord: a scalable peer-to-peer lookup service for internet applications[A]. Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications[C]. 2001. 149-160.
  • 9MIT, P2Psim[EB/OL]. http://pdos.csail.mit.edu/p2psim/, 2005.
  • 10eMule[EB/OL], http://www.emule-project.net/.

共引文献592

同被引文献45

  • 1钱雷.无线传感器网络节点安全定位研究[D].合肥:中国科学技术大学,2010.
  • 2GANERIWAL S, SRIVASTAVA M B. Reputation-based framework for high integrity sensor networks [ C]// SASN'04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Net- works. New York: ACM Press, 2006:66-77.
  • 3SRINIYASAN A, TEITELBAUM J, WU J. DRBTS: distributed reputation-based beacon trust system [ C]// Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Se- cure Computing. Piscataway: IEEE, 2006:277-283.
  • 4AUDUN J, ROSS H, POPE S. Trust network analysis with subjective logic [C] ∥ Proceedings of the 29th Australasian Computer Science Conference (ACSC 2006). Hobart: Australian Computer Society, 2006: 85-94.
  • 5KIM Y A, SONG H S. Strategies for predicting local trust based on trust propagation in social networks [J]. Knowledge Based Systems, 2011, 24(8): 1360-1371.
  • 6VERBIEST N, CORNELIS C, VICTOR P, et al. Trust and distrust aggregation enhanced with path length incorporation [J]. Fuzzy Sets and Systems, 2012, 202: 61-74.
  • 7SEPANDAR D K, MARIO T S, HECTOR G. The Eigentrust algorithm for reputation management in P2P networks [C] ∥ Proceedings of the 12th International Conference on World Wide Web (WWW’03). New York: ACM, 2003: 640-651.
  • 8XIONG L, LIU L. PeerTrust: supporting reputation based trust for peer to peer electronic communities [J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7): 843-857.
  • 9WANG Y, NAKAO A, VASILAKOS A V. Doubleface: robust reputation ranking based on link analysis in P2P networks [J]. Cybernetics and Systems, 2010, 41(2): 167-189.
  • 10CAVERLEE J, LIU L, WEBB S. The SocialTrust framework for trusted social information management: architecture and algorithms J]. Information Sciences, 2010, 180(1): 95-112.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部