Outlier detection in reputation management system for P2P networks using rough set theory

被引:1
|
作者
Selvaraj, Chithra [1 ]
Anand, Sheila [2 ]
机构
[1] SSN Coll Engn, Madras, Tamil Nadu, India
[2] Rajalakshmi Engn Coll, Madras, Tamil Nadu, India
关键词
peer-to-peer computing; rough set theory; reputation; indiscernibility decision matrix; logical rules;
D O I
10.1002/sec.685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) networks are distributed, decentralized, dynamic networks that are self-organized and self-managed. P2P networks have emerged over the past several years as an effective and scalable medium for sharing distributed resources. However, determining the reliability and trustworthiness of the participating peers still remains a major security challenge. Reputation-based trust management calculates peer trust as a measure of recommendations received from other peers. Malicious peers may give wrong reputation scores and also collude with other peers to make themselves or others appear trustworthy. In this paper, we propose the use of outlier detection technique to detect false testimony as outliers. We have applied rough set theory, an efficient and intelligent mathematical tool, to detect the outliers in the trust scores. We present the detailed methodology for implementing rough set theory for P2P network and detecting outlier scores in reputation metrics given by other peers and compared the model with the mechanism to detect outliers with the Eigen Trust model and eBay system. Trust computation without the outlier scores would be more accurate and enable proper verification and evaluation of peer trustworthiness. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
下载
收藏
页码:1153 / 1160
页数:8
相关论文
共 50 条
  • [41] X2BT trusted reputation system:: A robust mechanism for P2P networks
    Yu, Lan
    Susilo, Willy
    Safavi-Naini, Rei
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 364 - +
  • [42] The system design of a node of P2P networks for intrusion detection
    Ding, Lei
    Yu, Fei
    Yang, Zhenghua
    Yue, Guangxue
    Journal of Networks, 2013, 8 (08) : 1920 - 1927
  • [43] An outlier mining-based malicious node detection model for hybrid P2P networks
    Meng, Xianfu
    Ren, Shuang
    COMPUTER NETWORKS, 2016, 108 : 29 - 39
  • [44] An Incentive Mechanism Using Game Theory for P2P Networks
    Ouyang Jing-cheng
    Wang Yue-bin
    Hu Xu-huai
    Lin Ya-ping
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 715 - +
  • [45] Incentivising honest behaviour in P2P networks using blockchain-based reputation
    Sarros, Christos-Alexandros
    Kapetanidou, Ioanna Angeliki
    Tsaoussidis, Vassilis
    2021 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2021, : 132 - 137
  • [46] Trust Management Based on Fuzzy Sets Theory for P2P Networks
    Zhang, Jingan
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 461 - 465
  • [47] A decentralized scheme for reputation management in P2P virtual communities
    Li, Jingtao
    Wang, Xueping
    Ma, Jianqing
    Jia, Xuefeng
    Wang, Qian
    Zhang, Gendu
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 2800 - 2805
  • [48] BaRMS: A Bayesian Reputation Management Approach for P2P Systems
    Long, Xuelian
    Joshi, James
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2011, 10 (03) : 273 - 283
  • [49] Mobility management using P2P techniques in wireless networks
    Lo, Shou-Chih
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2007, 23 (02) : 421 - 439
  • [50] SIMULATING THE HUMAN FACTOR IN REPUTATION MANAGEMENT SYSTEMS FOR P2P NETWORKS An Agent Based Model
    Boella, Guido
    Remondino, Marco
    Tornese, Gianluca
    WEBIST 2009: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2009, : 5 - +