TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks

@inproceedings{Srivatsa2005TrustGuardCV,
  title={TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks},
  author={Mudhakar Srivatsa and Li Xiong and Ling Liu},
  booktitle={WWW '05},
  year={2005}
}
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact with one another without prior knowledge or experience. [] Key Method First, we provide a dependable trust model and a set of formal methods to handle strategic malicious nodes that continuously change their behavior to gain unfair advantages in the system.

Figures from this paper

A Reputation Based Attack Resistant Distributed Trust Management Model in P2P Networks
TLDR
RATM has advantages in combating various dynamic malicious behaviors such as dishonest feedbacks and strategic malicious attacks, over the current trust model, and shows more effectiveness and stronger dynamic adaptability.
Collusion Detection in Reputation Systems for Peer-to-Peer Networks
TLDR
Experimental results show that the proposed collusion detection method can significantly enhance the capability of existing reputation systems to deter collusion with low cost and further optimize the method by reducing the computing cost.
On the Modeling of Honest Players in Reputation Systems
  • Qing Zhang, Wei Wei, Ting Yu
  • Computer Science
    2008 The 28th International Conference on Distributed Computing Systems Workshops
  • 2008
TLDR
A statistical model is built for the transaction histories of honest players that serves as a profiling tool to identify suspicious entities and is combined with existing trust schemes to ensure that they are applied to entities whose transaction records are consistent with the statistical model.
The design of a reliable reputation system
TLDR
This paper identifies a thorough taxonomy on reputation management, and uses it as a framework to classify adversarial threats that compromise reliable operation of reputation systems and presents solutions to address the two leading reasons for erroneous and misleading values produced by reputation systems today.
Privacy Preserving Reputation Systems for Decentralized Environments
It has been observed that users in a reputation system often hesitate in providing negative feedback due to the fear of retaliation. A solution to this issue is privacy preserving reputation systems,
Secured trust and reputation system : analysis of malicious behaviors and optimization. (Gestion de la confiance et de la réputation sécurisée : analyse des attaques possibles et optimisation)
TLDR
This thesis describes ways of making reputation mechanisms more trustworthy and optimized by providing defense mechanism and analysis in distributed and non-distributed way.
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers
TLDR
The proposed method is capable of verifying the reputation systems against predefined attacks as well as discovering unknown attacks and can also find the worst possible attack plan against a given system.
A Comprehensive Analysis of Managing Cluster-Based Trust Model for Peer to Peer Networks
TLDR
Simulation results showed that the proposed model improved the security, reduced the network traffic, and enhanced stability of cluster, and efficiency of reputation management is noticeably raised.
A New Trust Framework Based on Reputation for Unstructured P2P Networks
TLDR
Considering the credibility of peers' referrals, a credibility quantification and update scheme is proposed in the paper as reliable means of seeking honest feedbacks and is shown to be robust in systems where the vast majority of users are malicious and more advanced in successful transaction rate.
Managing Cluster-Based Trust Model for Peer to Peer Networks
TLDR
Simulation results showed that the proposed model improved the security, reduced the network traffic, and enhanced stability of cluster, and efficiency of reputation management is noticeably raised.
...
...

References

SHOWING 1-10 OF 23 REFERENCES
The Eigentrust algorithm for reputation management in P2P networks
TLDR
An algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global trust value, based on the peer's history of uploads is described.
Managing trust in a peer-2-peer information system
TLDR
It is expected that scalable methods for trust management are an important factor, if fully decentralized peer-to-peer systems should become the platform for more serious applications than simple file exchange.
A reputation-based approach for choosing reliable resources in peer-to-peer networks
TLDR
This work proposes a self-regulating system where the P2P network is used to implement a robust reputation mechanism, and a distributed polling algorithm by which resource requestors can assess the reliability of a resource offered by a participant before initiating the download.
Reputation Management in P 2 P Networks : The EigenTrust Algorithm
TLDR
This paper focuses on P2P systems, which have the open and anonymous nature, which makes the surveillance of the network almost impossible, leaving many open doors for malicious individuals, who want to profit from what the system is offering.
Vulnerabilities and security threats in structured overlay networks: a quantitative analysis
TLDR
This paper studies several serious security threats in DHT-based systems through two targeted attacks at the overlay network's protocol layer, which disclose that the malicious nodes can target any specific data item in the system; and corrupt/modify the data item to its favor.
Choosing reputable servents in a P2P network
TLDR
An approach to P2P security where servents can keep track, and share with others, information about the reputation of their peers is proposed, based on a distributed polling algorithm by which resource requestors can assess the reliability of perspective providers before initiating the download.
Secure routing for structured peer-to-peer overlay networks
TLDR
This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks, and describes and evaluates techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.
A Social Mechanism of Reputation Management in Electronic Communities
TLDR
This work proposes a social mechanism of reputation management, which aims at avoiding interaction with undesirable participants, and leads to a decentralized society in which agents help each other weed out undesirable players.
Trust Management for the Semantic Web
TLDR
A web of trust is employed, in which each user maintains trusts in a small number of other users, and these trusts are composed into trust values for all other users.
Sanctioning Reputation Mechanisms in Online Trading Environments with Moral Hazard
This paper offers a systematic exploration of reputation mechanism design in trading environments with opportunistic sellers, imperfect monitoring of a seller's actions and two possible seller effort
...
...