Outlier detection in reputation management system for P2P networks using rough set theory

被引:1
|
作者
Selvaraj, Chithra [1 ]
Anand, Sheila [2 ]
机构
[1] SSN Coll Engn, Madras, Tamil Nadu, India
[2] Rajalakshmi Engn Coll, Madras, Tamil Nadu, India
关键词
peer-to-peer computing; rough set theory; reputation; indiscernibility decision matrix; logical rules;
D O I
10.1002/sec.685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) networks are distributed, decentralized, dynamic networks that are self-organized and self-managed. P2P networks have emerged over the past several years as an effective and scalable medium for sharing distributed resources. However, determining the reliability and trustworthiness of the participating peers still remains a major security challenge. Reputation-based trust management calculates peer trust as a measure of recommendations received from other peers. Malicious peers may give wrong reputation scores and also collude with other peers to make themselves or others appear trustworthy. In this paper, we propose the use of outlier detection technique to detect false testimony as outliers. We have applied rough set theory, an efficient and intelligent mathematical tool, to detect the outliers in the trust scores. We present the detailed methodology for implementing rough set theory for P2P network and detecting outlier scores in reputation metrics given by other peers and compared the model with the mechanism to detect outliers with the Eigen Trust model and eBay system. Trust computation without the outlier scores would be more accurate and enable proper verification and evaluation of peer trustworthiness. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1153 / 1160
页数:8
相关论文
共 50 条
  • [21] A novel protocol for communicating reputation in P2P networks
    Yonezawa, Kouki
    TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 412 - 422
  • [22] Trust and Reputation Algorithms for Unstructured P2P Networks
    Chen, Shanshan
    Zhang, Yunchang
    Yang, Geng
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 346 - +
  • [23] Credibility Based Reputation Calculation in P2P Networks
    Prasad, R. V. V. S. V.
    Srinivas, Vegi
    Kumari, V. Valli
    Raju, K. V. S. V. N.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2008, 5375 : 188 - +
  • [24] Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa
    Mills, Godfrey A.
    Pomary, Pamela
    Togo, Emmanuel
    Sowah, Robert A.
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (02)
  • [25] Detection and Management of P2P Traffic in Networks using Artificial Neural Networksa
    Godfrey A. Mills
    Pamela Pomary
    Emmanuel Togo
    Robert A. Sowah
    Journal of Network and Systems Management, 2022, 30
  • [26] Worm detection system based on P2P networks
    Tang, Haokun
    Liu, Yanbing
    Huang, Jun
    Xiao, Yunpeng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 230 - 235
  • [27] TRUST BASED COMMUNICATION IN UNSTRUCTURED P2P NETWORKS USING REPUTATION MANAGEMENT AND SELF CERTIFICATION MECHANISM
    Sasitharagai, M.
    Renuga, A.
    Padmashree, A.
    Rajendran, T.
    2012 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING EDUCATION: INNOVATIVE PRACTICES AND FUTURE TRENDS (AICERA), 2012,
  • [28] Implementing Database Management System in P2P Networks
    Shen, Xinpeng
    Li, Zhanhuai
    2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS, 2008, : 528 - 532
  • [29] STORM: A secure overlay for P2P reputation management
    Ravoaja, Aina
    Anceaume, Emmanuelle
    FIRST IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS, 2007, : 247 - +
  • [30] Trust management without reputation in P2P games
    Wierzbicki, Adam
    SECRYPT 2006: Proceedings of the International Conference on Security and Cryptography, 2006, : 126 - 134