...
首页> 外文期刊>Peer-to-peer networking and applications >Peer profile based trust model for P2P systems using genetic algorithm - Springer
【24h】

Peer profile based trust model for P2P systems using genetic algorithm - Springer

机译:使用遗传算法的基于对等概要的P2P系统信任模型-Springer

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The open and anonymous nature of P2P allows peers to easily share their data and other resources among multiple peers, but the absence of a defensible border raise serious security concerns for the users. There is a lack of accountability for the content that is shared by peers and it is hard to distinguish malicious users from honest peers. Establishing Trust relationship between peers can serve as the metric to determine the veracity of the shared content and reliability of the peers. Most of the research work in this area is on Reputation based trust management where trust is determined on the basis of recommendation of other peers. Such recommendations are subjective and can be biased. A number of peers can also collude to provide false testimony for malicious peers. This paper proposes a novel Trust model that combines peer profiling with anomaly detection technique. Each peer can establish trust based on its own prior activities with other peers by comparing the current activity of a peer with its historical data and Genetic Algorithm (GA) has been employed to detect the anomalous behavior. Peer profile is updated dynamically with every transaction using GA operator’s crossover and mutation. This model has been tested using a file sharing application against common attacks and the results obtained are compared with statistical anomaly detection approach.
机译:P2P的开放和匿名性质允许对等方轻松地在多个对等方之间共享其数据和其他资源,但是缺少可辩护的边界会给用户带来严重的安全隐患。对等体共享的内容缺乏责任感,很难区分恶意用户和诚实对等体。在对等方之间建立信任关系可以用作确定共享内容的准确性和对等方可靠性的度量。该领域中的大多数研究工作都是基于信誉的信任管理,其中信任是根据其他同行的推荐来确定的。此类建议是主观的,可能会有偏差。许多对等方还可以合谋为恶意对等方提供虚假证词。本文提出了一种新颖的Trust模型,该模型将对等体分析与异常检测技术相结合。每个对等方都可以通过将对等方的当前活动与其历史数据进行比较,基于自己与其他对等方的先前活动来建立信任,并且遗传算法(GA)已用于检测异常行为。使用GA运营商的交叉和变异功能,每笔交易都会动态更新对等个人资料。该模型已经使用文件共享应用程序针对常见攻击进行了测试,并将获得的结果与统计异常检测方法进行了比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号