NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Spreading Activation Models for Trust Propagation
EEE '04 Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
Denial of service attacks and defenses in decentralized trust management
International Journal of Information Security
Controversial users demand local trust metrics: an experimental study on Epinions.com community
AAAI'05 Proceedings of the 20th national conference on Artificial intelligence - Volume 1
Trust Modeling for Networked Organizations Using Reputation and Collaboration Estimates
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
On trust models and trust evaluation metrics for ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Today, internet with its innumerable resources has become a basic amenity to the sophisticated society. Major accessibility paradigms used in business and informational domains are web and grid services. Any service is viewed as interoperable interactions among the hosts over a network. Many web and grid resources are vulnerable to security attacks and distributed denial of service attack is a threatening one that makes the resources unavailable. This paper addresses this security issue with respect to the trustworthiness of the client nodes participating in internet computing. Proposed solution is focused at making the underlying network reliable for transactions by identifying attack clients based on their behaviour in request participation using a trust model, to substantially prevent them from participating in normal data transactions and to ensure sustainable network. The model is tested with subnets of varying size and varying amount of request traffic and is deployed in active networking environment.