A Malicious Peers Detection Framework for Peer-to-Peer Systems
نویسندگان
چکیده
A number of reputation mechanisms are introduced in recent years to alleviate the blindness during peer selection in distributed P2P environment where malicious peers coexist with honest ones. They indeed provide incentives for peers to contribute more resources to the system, and thus, promote the whole system performance. However, little attention has been paid on how to identify the malicious peers in this situation. In this paper, a general framework is presented for detecting malicious peers in Reputation-based P2P systems. Firstly, the malicious peers are divided into various categories and the problem is formulated. Secondly, the general framework is put forward which mainly contains four steps, i.e. data collection, data processing, malicious peers detection and malicious peers clustering. Thirdly, an algorithm implementation of this general framework named IDEA is put forward based on Principal Direction Divisive Partitioning and K-means clustering. Finally, a series of simulation experiments are conducted to evaluate the effectiveness of IDEA. Simulation results have shown that IDEA can precisely distinguish and cluster the malicious peers. Subject Categories and Descriptors C.2.1 [Network Architecture and Design]: Distributed networks; I.5.3 Clustering]: Algorithms General Terms: Distributed networks, P2P, Clustering
منابع مشابه
A Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملThrottling Attackers in Peer-to-Peer Media Streaming Systems
We present a flexible framework for throttling attackers in peer-to-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS attackers) can overwhelm the system by issuing too many requests in a short interval of time. Since peer-to-peer systems are decentralized, it is difficult for individual peers to limit the aggregate download bandwidt...
متن کاملSurvey of Detection of Malicious Nodes in Peer to Peer
Peer-to-peer streaming has witnessed a great success, thanks to the possibility of aggregating resources from all participants. However, performance of the entire system may be highly degraded due to the presence of malicious peers that share bogus data on purpose. In a peer-to-peer (P2P) streaming system, since each peer needs to participate in uploading data to other peers, malicious peers ma...
متن کاملDistributed Trust Management Model for Peer To Peer Systems
In a file sharing peer-to peer system trust is essential to attain enhanced cooperation between peers. Reputation is utilized in reputation-based peer-to-peer systems to form trust between peers. Commonly in these systems, extremely reputable peers will be chosen to upload requested files and thus diminishing malicious uploads in the system considerably. Conversely, malicious peers should be en...
متن کاملReputation-based Trust Management in Peer-to-Peer File Sharing Systems
Trust is required in file sharing peer-to-peer (P2P) systems to achieve better cooperation among peers and reduce malicious uploads. In reputation-based P2P systems, reputation is used to build trust among peers based on their past transactions and feedbacks from other peers. In these systems, reputable peers will usually be selected to upload requested files, decreasing significantly malicious...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015