A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
Limited reputation sharing in P2P systems
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Analyzing the Characteristics of Gnutella Overlays
ITNG '07 Proceedings of the International Conference on Information Technology
Characteristic Analysis of Virus Spreading in Ad Hoc Networks
CISW '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops
A Reputation Management Scheme Improving the Trustworthiness of P2P Networks
ICHIT '08 Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology
A survey and comparison of peer-to-peer overlay network schemes
IEEE Communications Surveys & Tutorials
A Measurement Study of a Large-Scale P2P IPTV System
IEEE Transactions on Multimedia
The impact of countermeasure propagation on the prevalence of computer viruses
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Hi-index | 0.00 |
Peer-to-peer (P2P) networking is used by users with similar interests to exchange, contribute, or obtain files. This network model has been proven popular to exchange music, pictures, or software applications that are saved, and most likely executed at the downloading host. At the expense of this mechanism, worms, viruses, and intruding files find an open front door to the downloading host and giving them place to a very convenient environment for successful proliferation throughout the network. Although virus detection software are currently available, this countermeasure works in a reactive approach and most times isolated manner. In this paper, we consider a trust management scheme to contain the proliferation of viruses in P2P networks. Specifically, we propose a trust management system based on a two-layer approach to bound the proliferation of viruses. The new scheme is called Double-layer Dynamic Trust (DDT) management scheme. Our results show the proposed scheme bounds virus proliferation. With this approach, the number of infected hosts and proliferation rate are limited to small values. We compare our results to other existing approaches.