Abstract
In this paper, we introduce a framework to detect possible sybil attacks against a trust management scheme of peer-to-peer (P2P) networks used for limiting the proliferation of malware. Sybil attacks may underscore the effectivity of such schemes as malicious peers may use bogus identities to artificially manipulate the reputation, and therefore, the levels of trust of several legitimate and honest peers. The framework includes a k-means clustering scheme, a method to verify the transactions reported by peers, and identification of possible collaborations between peers. We prove that as the amount of public information on peers increases, the effectivity of sybil attacks may decrease. We study the performance of each of these mechanisms, in terms of the number of infected peers in a P2P network, using computer simulation. We show the effect of each mechanism and their combinations. We show that the combination of these schemes is effective and efficient.
Original language | English (US) |
---|---|
Title of host publication | 2014 IEEE International Conference on Communications, ICC 2014 |
Publisher | IEEE Computer Society |
Pages | 841-846 |
Number of pages | 6 |
ISBN (Print) | 9781479920037 |
DOIs | |
State | Published - Jan 1 2014 |
Event | 2014 1st IEEE International Conference on Communications, ICC 2014 - Sydney, NSW, Australia Duration: Jun 10 2014 → Jun 14 2014 |
Other
Other | 2014 1st IEEE International Conference on Communications, ICC 2014 |
---|---|
Country/Territory | Australia |
City | Sydney, NSW |
Period | 6/10/14 → 6/14/14 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications