Do social networks improve e-commerce?: a study on social marketplaces
Proceedings of the first workshop on Online social networks
RepTrap: a novel attack on feedback-based reputation systems
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Peer-assisted content distribution with prices
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Robust and efficient incentives for cooperative content distribution
IEEE/ACM Transactions on Networking (TON)
Prices are right: managing resources and incentives in peer-assisted content distribution
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Breaking bidder collusion in large-scale spectrum auctions
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
The design of a reliable reputation system
Electronic Commerce Research
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Inter-domain pricing: challenges and possible approaches
International Journal of Network Management
Collusion in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Sybil defenses via social networks: a tutorial and survey
ACM SIGACT News
TD-trust: a time domain based P2P trust model
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part I
Reputation inflation detection in a Chinese C2C market
Electronic Commerce Research and Applications
Privacy preserving indexing for eHealth information networks
Proceedings of the 20th ACM international conference on Information and knowledge management
Uncovering social network sybils in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Reliable client accounting for P2P-infrastructure hybrids
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
SybilControl: practical sybil defense with computational puzzles
Proceedings of the seventh ACM workshop on Scalable trusted computing
What's a little collusion between friends?
Proceedings of the 2013 ACM symposium on Principles of distributed computing
International Journal of Grid and Utility Computing
Identifying unreliable sources of skill and competency information
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Multimedia Tools and Applications
Uncovering social network Sybils in the wild
ACM Transactions on Knowledge Discovery from Data (TKDD) - Casin special issue
Hi-index | 0.00 |
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain unfair advantages over others. While techniques have been proposed to combat web spam collusion, there are few measurements of real collusion in deployed systems. In this paper, we report analysis and measurement results of user collusion in Maze, a large-scale peer-to-peer file sharing system with a non-net-zero point-based incentive policy. We search for colluding behavior by examining complete user logs, and incrementally refine a set of collusion detectors to identify common collusion patterns.We find collusion patterns similar to those found in web spamming. We evaluate how proposed reputation systems would perform on the Maze system. Our results can help guide the design of more robust incentive schemes.