Peer-to-peer's most wanted: malicious peers

  • Authors:
  • Loubna Mekouar;Youssef Iraqi;Raouf Boutaba

  • Affiliations:
  • School of Computer Science, University of Waterloo, Waterloo, ON, Canada;School of Computer Science, University of Waterloo, Waterloo, ON, Canada;School of Computer Science, University of Waterloo, Waterloo, ON, Canada

  • Venue:
  • Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we propose a reputation management scheme for partially decentralized peer-to-peer systems. The reputation scheme helps to build trust among peers based on their past experiences and feedback from other peers. Two selection advisor algorithms are proposed for helping peers to select the most trustworthy peer to download from. The proposed algorithms can detect malicious peers sending inauthentic files. The Malicious detector algorithm is also proposed to detect liar peers that send the wrong feedback to subvert the reputation system. The new concept of suspicious transactions is introduced and explained. Simulation results confirm the capability of the proposed algorithms to effectively detect malicious peers and isolate them from the system, hence reducing the amount of inauthentic uploads, increasing peers' satisfaction, and preserving network resources.