• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Feng Jingyu, Zhang Yuqing, Chen Shenlong, Fu Anmin. GoodRep Attack and Defense in P2P Reputation Systems[J]. Journal of Computer Research and Development, 2011, 48(8): 1473-1480.
Citation: Feng Jingyu, Zhang Yuqing, Chen Shenlong, Fu Anmin. GoodRep Attack and Defense in P2P Reputation Systems[J]. Journal of Computer Research and Development, 2011, 48(8): 1473-1480.

GoodRep Attack and Defense in P2P Reputation Systems

More Information
  • Published Date: August 14, 2011
  • Reputation systems are playing critical roles in P2P networks as a method to assess the trustworthiness of peers and to combat malicious peers. However, the characteristic of aggregating ratings makes reputation systems vulnerable to be abused by false ratings, and thus offering opportunities for malicious peers. They can conspire with each other to form a collusive clique and unfairly increase the reputation of them. Under the cover of high reputation, malicious peers can masquerade as trusted ones and violate P2P networks arbitrarily. This attack model, called GoodRep, is described in this paper. In order to defend against GoodRep attack, the RatingGuard scheme is proposed to secure P2P reputation systems. This scheme is built with three functional modules: DC, DP and AD. The data collection (DC) module supports the collection of the previous rating data among raters. The data processing (DP) module measures the rating similarity of raters’ activities by analyzing these data. To identify GoodRep cliques, the abnormal detection (AD) module detects the abnormalities through clustering partition technology. The experimental results show that our RatingGuard scheme is effective in suppressing GoodRep attack, and the reputation system with RatingGuard gains higher detection ratio of malicious peers compared with the traditional schemes.
  • Related Articles

    [1]Zhang Lei, He Chongde, Wei Lifei. Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets[J]. Journal of Computer Research and Development, 2022, 59(10): 2286-2298. DOI: 10.7544/issn1000-1239.20220471
    [2]Ma Haiyan, Liang Yongquan, Ji Shujuan, Li Da. A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis[J]. Journal of Computer Research and Development, 2018, 55(12): 2685-2702. DOI: 10.7544/issn1000-1239.2018.20170587
    [3]Sun Yong, Tan Wenan, Jin Ting, Zhou Liangguang. A Collaborative Collusion Detection Method Based on Online Clustering[J]. Journal of Computer Research and Development, 2018, 55(6): 1320-1332. DOI: 10.7544/issn1000-1239.2018.20170231
    [4]Wang Tiefeng, Cai Ying, Zhang Yujie. Reputation-Based Defense Scheme Against Pollution Attacks on Network Coding[J]. Journal of Computer Research and Development, 2016, 53(11): 2491-2499. DOI: 10.7544/issn1000-1239.2016.20150502
    [5]Hu Jianli, Zhou Bin, Wu Quanyuan, Li Xiaohua. A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development, 2011, 48(12): 2235-2241.
    [6]Miao Guangsheng, Feng Dengguo, Su Purui. A Collusion Detector Based on Fuzzy Logic in P2P Trust Model[J]. Journal of Computer Research and Development, 2011, 48(12): 2187-2200.
    [7]Xie Zhen, Bi Jingping, Li Ye. A Consecutive-Behaviors-Observing-Based Neighbor Evaluation Model in P2P Network[J]. Journal of Computer Research and Development, 2010, 47(6): 1098-1106.
    [8]Jin Yu, Gu Zhimin, and Ban Zhijie. A New Reputation Management Mechanism Based on Bi-Ratings in Peer-to-Peer Systems[J]. Journal of Computer Research and Development, 2008, 45(6).
    [9]Wu Peng, Wu Guoxin, and Fang Qun. A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems[J]. Journal of Computer Research and Development, 2008, 45(3): 408-416.
    [10]Wu Peng, Wu Guoxin, and Fang Qun. A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems[J]. Journal of Computer Research and Development, 2008, 45(3): 408-416.

Catalog

    Article views (685) PDF downloads (417) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return