TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks

@inproceedings{Srivatsa2005TrustGuardCV,
  title={TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks},
  author={Mudhakar Srivatsa and Li Xiong and Ling Liu},
  booktitle={WWW '05},
  year={2005}
}
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact with one another without prior knowledge or experience. [] Key Method First, we provide a dependable trust model and a set of formal methods to handle strategic malicious nodes that continuously change their behavior to gain unfair advantages in the system.

Figures from this paper

A Reputation Based Attack Resistant Distributed Trust Management Model in P2P Networks
TLDR
RATM has advantages in combating various dynamic malicious behaviors such as dishonest feedbacks and strategic malicious attacks, over the current trust model, and shows more effectiveness and stronger dynamic adaptability.
Collusion Detection in Reputation Systems for Peer-to-Peer Networks
TLDR
Experimental results show that the proposed collusion detection method can significantly enhance the capability of existing reputation systems to deter collusion with low cost and further optimize the method by reducing the computing cost.
On the Modeling of Honest Players in Reputation Systems
  • Qing Zhang, Wei Wei, Ting Yu
  • Computer Science
    2008 The 28th International Conference on Distributed Computing Systems Workshops
  • 2008
TLDR
A statistical model is built for the transaction histories of honest players that serves as a profiling tool to identify suspicious entities and is combined with existing trust schemes to ensure that they are applied to entities whose transaction records are consistent with the statistical model.
Privacy Preserving Reputation Systems for Decentralized Environments
It has been observed that users in a reputation system often hesitate in providing negative feedback due to the fear of retaliation. A solution to this issue is privacy preserving reputation systems,
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers
TLDR
The proposed method is capable of verifying the reputation systems against predefined attacks as well as discovering unknown attacks and can also find the worst possible attack plan against a given system.
A Comprehensive Analysis of Managing Cluster-Based Trust Model for Peer to Peer Networks
TLDR
Simulation results showed that the proposed model improved the security, reduced the network traffic, and enhanced stability of cluster, and efficiency of reputation management is noticeably raised.
A New Trust Framework Based on Reputation for Unstructured P2P Networks
TLDR
Considering the credibility of peers' referrals, a credibility quantification and update scheme is proposed in the paper as reliable means of seeking honest feedbacks and is shown to be robust in systems where the vast majority of users are malicious and more advanced in successful transaction rate.
Trusted Reputation Management Service for Peer-to-Peer Collaboration
TLDR
This work designs a fully-distributed and secure reputation management scheme, Trusted Reputation Management Service (TRMS), and proposes to add integrity control for the reputation storage/computation processing in order to enhance the authenticity of the resultant reputation values.
Globally Decoupled Reputations for Large Distributed Networks
TLDR
This paper proposes a scalable approach to system-wide decoupled service and feedback reputations and demonstrates the effectiveness and scalability of the model as compared to PeerTrust, an alternative mechanism proposed for decoupling reputations.
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems
TLDR
Simulation results indicate that the model compared to other existing models can effectively cope with strategic behavioral change of malicious agents and at the same time efficiently distribute workload among the service providing agents under stable condition.
...
...

References

SHOWING 1-10 OF 23 REFERENCES
The Eigentrust algorithm for reputation management in P2P networks
TLDR
An algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global trust value, based on the peer's history of uploads is described.
Managing trust in a peer-2-peer information system
TLDR
It is expected that scalable methods for trust management are an important factor, if fully decentralized peer-to-peer systems should become the platform for more serious applications than simple file exchange.
A reputation-based approach for choosing reliable resources in peer-to-peer networks
TLDR
This work proposes a self-regulating system where the P2P network is used to implement a robust reputation mechanism, and a distributed polling algorithm by which resource requestors can assess the reliability of a resource offered by a participant before initiating the download.
Vulnerabilities and security threats in structured overlay networks: a quantitative analysis
TLDR
This paper studies several serious security threats in DHT-based systems through two targeted attacks at the overlay network's protocol layer, which disclose that the malicious nodes can target any specific data item in the system; and corrupt/modify the data item to its favor.
Choosing reputable servents in a P2P network
TLDR
An approach to P2P security where servents can keep track, and share with others, information about the reputation of their peers is proposed, based on a distributed polling algorithm by which resource requestors can assess the reliability of perspective providers before initiating the download.
Secure routing for structured peer-to-peer overlay networks
TLDR
This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks, and describes and evaluates techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.
A Social Mechanism of Reputation Management in Electronic Communities
TLDR
This work proposes a social mechanism of reputation management, which aims at avoiding interaction with undesirable participants, and leads to a decentralized society in which agents help each other weed out undesirable players.
Trust Management for the Semantic Web
TLDR
A web of trust is employed, in which each user maintains trusts in a small number of other users, and these trusts are composed into trust values for all other users.
Sanctioning Reputation Mechanisms in Online Trading Environments with Moral Hazard
This paper offers a systematic exploration of reputation mechanism design in trading environments with opportunistic sellers, imperfect monitoring of a seller's actions and two possible seller effort
The Sybil Attack
TLDR
It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
...
...