http://repositorio.unb.br/handle/10482/10943
File | Description | Size | Format | |
---|---|---|---|---|
ARTIGO_GroupTrustYields.pdf | 326,63 kB | Adobe PDF | View/Open |
Title: | Group trust yields improved scalability and anomalydetection for p2p systems |
Authors: | Albuquerque, Robson de Oliveira Sousa Júnior, Rafael Timóteo de Bezerra, Lorena de Souza Lima, Giselle Rosa de |
Assunto:: | Arquitetura de redes de computadores Redes de computação - avaliação Sistemas eletrônicos |
Issue Date: | 2007 |
Publisher: | Brazilian Association of High Technology Experts (ABEAT) |
Citation: | ALBUQUERQUE, Robson de Oliveira et al. Group trust yields improved scalability and anomalydetection for p2p systems. The International Journal of Forensic Computer Science, v. 3, n. 1, p. 75-86, 2007. Disponível em:<http://www.ijofcs.org/abstract-v03n1-pp08.html>. Acesso em: 21 jun. 2012. doi: http://dx.doi.org/10.5769/J200801008 |
Abstract: | This paper implements an existing computational model of trust and reputationapplied to a P2P environment, and extends the approach using a novel group trust calculationthat demonstrates improved scalability and anomaly detection for P2P systems. Our analysis isbased on results obtained by simulating a P2P environment using the JXTA open source platform.A trust and reputation model was implemented in the same platform, allowing to constructinga baseline for the behavior of the nodes using combined trust and reputation coefficients in ascenario without malicious nodes. Then simulations were conducted with malicious nodes andthe effect of trust and reputation factors were analyzed regarding their influence on the anomalydetection capacity and scalability in P2P communications. Several simulation scenarios wereconfigured and explored, considering the presence of different number of malicious nodes in theP2P environment, with both constant and variable behavior. Other scenarios included calculationsof combined trust and reputation for node groups. The results show that group trust ensure moreinteractions among nodes, even in the presence of a large number of malicious nodes (60% of thetotal), besides providing focused identification of malicious nodes inside groups. |
Licença:: | Disponível sob Licença Creative Commons 3.0, que permite copiar, distribuir e transmitir o trabalho, desde que seja citado o autor e licenciante. Não permite o uso para fins comerciais nem a adaptação desta. |
DOI: | https://dx.doi.org/10.5769/J200801008 |
Appears in Collections: | Artigos publicados em periódicos e afins |
This item is licensed under a Creative Commons License