TY - GEN
T1 - Containing sybil attacks on trust management schemes for peer-to-peer networks
AU - Cai, Lin
AU - Rojas-Cessa, Roberto
PY - 2014
Y1 - 2014
N2 - In this paper, we introduce a framework to detect possible sybil attacks against a trust management scheme of peer-to-peer (P2P) networks used for limiting the proliferation of malware. Sybil attacks may underscore the effectivity of such schemes as malicious peers may use bogus identities to artificially manipulate the reputation, and therefore, the levels of trust of several legitimate and honest peers. The framework includes a k-means clustering scheme, a method to verify the transactions reported by peers, and identification of possible collaborations between peers. We prove that as the amount of public information on peers increases, the effectivity of sybil attacks may decrease. We study the performance of each of these mechanisms, in terms of the number of infected peers in a P2P network, using computer simulation. We show the effect of each mechanism and their combinations. We show that the combination of these schemes is effective and efficient.
AB - In this paper, we introduce a framework to detect possible sybil attacks against a trust management scheme of peer-to-peer (P2P) networks used for limiting the proliferation of malware. Sybil attacks may underscore the effectivity of such schemes as malicious peers may use bogus identities to artificially manipulate the reputation, and therefore, the levels of trust of several legitimate and honest peers. The framework includes a k-means clustering scheme, a method to verify the transactions reported by peers, and identification of possible collaborations between peers. We prove that as the amount of public information on peers increases, the effectivity of sybil attacks may decrease. We study the performance of each of these mechanisms, in terms of the number of infected peers in a P2P network, using computer simulation. We show the effect of each mechanism and their combinations. We show that the combination of these schemes is effective and efficient.
KW - Distributed system
KW - key mean clustering
KW - malware proliferation
KW - p2p network
KW - sybil attack
KW - transaction verification
UR - http://www.scopus.com/inward/record.url?scp=84906993237&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84906993237&partnerID=8YFLogxK
U2 - 10.1109/ICC.2014.6883424
DO - 10.1109/ICC.2014.6883424
M3 - Conference contribution
AN - SCOPUS:84906993237
SN - 9781479920037
T3 - 2014 IEEE International Conference on Communications, ICC 2014
SP - 841
EP - 846
BT - 2014 IEEE International Conference on Communications, ICC 2014
PB - IEEE Computer Society
T2 - 2014 1st IEEE International Conference on Communications, ICC 2014
Y2 - 10 June 2014 through 14 June 2014
ER -