In this work we study the effectiveness of mechanisms for decentralized reputation management in P2P networks. We depart from Eigen Trust, an algorithm designed for reputation management in file sharing applications over p2p networks. EigenTrust has been proved very effective against three different natural attacks from malicious coalitions while it performs poorly on particular attack organized by two different kinds of malicious peers. We propose various metrics of reputation based on ideas recently introduced for detecting and demoting Web spam. We combine these metrics with the original EigenTrust approach. Our mechanisms are more effective than EigenTrust alone for detecting malicious peers and reducing the number of inauthentic downloads not only for all the cases previously addressed but also for more sophisticated attacks. Copyright 2007 ACM.
New metrics for reputation management in P2P networks / Donato, Debora; Mario, Paniccia; Maddalena, Selis; Carlos, Castillo; Giovanni, Cortese; Leonardi, Stefano. - 215:(2007), pp. 65-72. (Intervento presentato al convegno AIRWeb 2007 - 3rd International Workshop on Adversarial Information Retrieval on the Web tenutosi a Banff; Canada nel 8 May 2007 through 8 May 2007) [10.1145/1244408.1244421].
New metrics for reputation management in P2P networks
LEONARDI, Stefano
2007
Abstract
In this work we study the effectiveness of mechanisms for decentralized reputation management in P2P networks. We depart from Eigen Trust, an algorithm designed for reputation management in file sharing applications over p2p networks. EigenTrust has been proved very effective against three different natural attacks from malicious coalitions while it performs poorly on particular attack organized by two different kinds of malicious peers. We propose various metrics of reputation based on ideas recently introduced for detecting and demoting Web spam. We combine these metrics with the original EigenTrust approach. Our mechanisms are more effective than EigenTrust alone for detecting malicious peers and reducing the number of inauthentic downloads not only for all the cases previously addressed but also for more sophisticated attacks. Copyright 2007 ACM.File | Dimensione | Formato | |
---|---|---|---|
VE_2007_11573-60798.pdf
solo gestori archivio
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
339.77 kB
Formato
Adobe PDF
|
339.77 kB | Adobe PDF | Contatta l'autore |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.