Taxonomy of attacks and defense mechanisms in P2P reputation systems-Lessons for reputation system designers

被引:36
|
作者
Koutrouli, Eleni [1 ]
Tsalgatidou, Aphrodite [1 ]
机构
[1] Univ Athens, Dept Informat & Telecommun, Athens 15771, Greece
关键词
Reputation systems; Reputation attacks; Threat analysis; Credibility; Reputation attacks taxonomy; Peer-to-Peer;
D O I
10.1016/j.cosrev.2012.01.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Robust and credible reputation systems are essential for the functionality of Peer-to-Peer (P2P) applications. However, they themselves are susceptible to various types of attacks. Since most current efforts lack an exploration of a comprehensive adversary model, we try to fill in this gap by providing a thorough view of the various credibility threats against a decentralized reputation system and the respective defense mechanisms. Therefore, we explore and classify the types of potential attacks against reputation systems for P2P applications. We also study and classify the defense mechanisms which have been proposed for each type of attack and identify conflicts between defense mechanisms and/or desirable characteristics of credible reputations systems. We finally propose a roadmap for reputation system designers on how to use the results of our survey for the design of robust reputation systems for P2P applications. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:47 / 70
页数:24
相关论文
共 50 条
  • [21] Local reputation for P2P MMOG design
    Liu, Shanshan
    Li, Jinlong
    Wang, Xufa
    EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 523 - 527
  • [22] Hierarchical reputation model for P2P networks
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    Dianzi Yu Xinxi Xuebao, 2007, 11 (2560-2563): : 2560 - 2563
  • [23] An effective calculation of reputation in P2P networks
    Prasad, R.V.V.S.V.
    Srinivas, Vegi
    Kumari, V. Valli
    Raju, K.V.S.V.N.
    Journal of Networks, 2009, 4 (05) : 332 - 342
  • [24] Propagation Model of Reputation in P2P Networks
    Sun, Hua
    Li, Li
    Yang, Wenzhong
    Qian, Yurong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 368 - +
  • [25] Low cost and reliable anonymity protocols in P2P reputation systems
    Peng H.
    Lu S.-N.
    Zhao D.-D.
    Zhang A.-X.
    Journal of Shanghai Jiaotong University (Science), 2010, 15 (02) : 207 - 212
  • [26] A new reputation mechanism against dishonest recommendations in P2P systems
    Chang, Junsheng
    Wang, Huaimin
    Yin, Gang
    Tang, Yangbin
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2007, PROCEEDINGS, 2007, 4831 : 449 - 460
  • [27] Low Cost and Reliable Anonymity Protocols in P2P Reputation Systems
    彭浩
    陆松年
    赵丹丹
    张爱新
    Journal of Shanghai Jiaotong University(Science), 2010, 15 (02) : 207 - 212
  • [28] Identity crisis: Anonymity vs. reputation in P2P systems
    Marti, S
    Garcia-Molina, H
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 134 - 141
  • [29] P2P Reputation Systems Credibility Analysis: Tradeoffs and Design Decisions
    Koutrouli, Eleni
    Tsalgatidou, Aphrodite
    PCI 2008: 12TH PAN-HELLENIC CONFERENCE ON INFORMATICS, PROCEEDINGS, 2008, : 88 - 92
  • [30] Alliatrust: A trustable reputation management scheme for unstructured P2P systems
    Gerard, Jeffrey
    Cai, Hailong
    Wang, Jun
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3947 : 115 - 125