Outlier detection in reputation management system for P2P networks using rough set theory

被引:1
|
作者
Selvaraj, Chithra [1 ]
Anand, Sheila [2 ]
机构
[1] SSN Coll Engn, Madras, Tamil Nadu, India
[2] Rajalakshmi Engn Coll, Madras, Tamil Nadu, India
关键词
peer-to-peer computing; rough set theory; reputation; indiscernibility decision matrix; logical rules;
D O I
10.1002/sec.685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) networks are distributed, decentralized, dynamic networks that are self-organized and self-managed. P2P networks have emerged over the past several years as an effective and scalable medium for sharing distributed resources. However, determining the reliability and trustworthiness of the participating peers still remains a major security challenge. Reputation-based trust management calculates peer trust as a measure of recommendations received from other peers. Malicious peers may give wrong reputation scores and also collude with other peers to make themselves or others appear trustworthy. In this paper, we propose the use of outlier detection technique to detect false testimony as outliers. We have applied rough set theory, an efficient and intelligent mathematical tool, to detect the outliers in the trust scores. We present the detailed methodology for implementing rough set theory for P2P network and detecting outlier scores in reputation metrics given by other peers and compared the model with the mechanism to detect outliers with the Eigen Trust model and eBay system. Trust computation without the outlier scores would be more accurate and enable proper verification and evaluation of peer trustworthiness. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
下载
收藏
页码:1153 / 1160
页数:8
相关论文
共 50 条
  • [31] Content access control scheme for P2P networks using a reputation value
    Aburada, Kentaro
    Kita, Yoshihiro
    Park, Mirang
    Okazaki, Naonobu
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 527 - 533
  • [32] Efficient Botnet Detection based on Reputation Model and Content Auditing in P2P Networks
    Kalaivani, K.
    Suguna, C.
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [33] Behavior-based reputation management in P2P file-sharing networks
    Fan, Xinxin
    Li, Mingchu
    Ma, Jianhua
    Ren, Yizhi
    Zhao, Hui
    Su, Zhiyuan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (06) : 1737 - 1750
  • [34] How users' participation affects reputation management systems: The case of P2P networks
    Remondino, Marco
    Boella, Guido
    SIMULATION MODELLING PRACTICE AND THEORY, 2010, 18 (10) : 1493 - 1505
  • [35] P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
    Dewan, Prashant
    Dasgupta, Partha
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2010, 22 (07) : 1000 - 1013
  • [36] Outlier detection using conditional information entropy and rough set theory
    Li, Zhaowen
    Wei, Shengxue
    Liu, Suping
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (01) : 1899 - 1918
  • [37] Topology management in unstructured P2P networks using neural networks
    Auvinen, Annemari
    Keltanen, Teemu
    Vapa, Mikko
    2007 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-10, PROCEEDINGS, 2007, : 2358 - 2365
  • [38] A novel transfer protocol for reputation sharing on P2P networks
    Ma, Xin-Xin
    Qin, Zhi-Guang
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 431 - +
  • [39] A Fuzzy Trust Management Based on Outlier Identification for P2P
    Luo, Zhen
    Li, Zhishu
    Cai, Biao
    ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 678 - +
  • [40] Enabling Fast Bootstrap of Reputation in P2P Mobile Networks
    Cascella, Roberto G.
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 371 - 378