• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Miao Guangsheng, Feng Dengguo, Su Purui. A Collusion Detector Based on Fuzzy Logic in P2P Trust Model[J]. Journal of Computer Research and Development, 2011, 48(12): 2187-2200.
Citation: Miao Guangsheng, Feng Dengguo, Su Purui. A Collusion Detector Based on Fuzzy Logic in P2P Trust Model[J]. Journal of Computer Research and Development, 2011, 48(12): 2187-2200.

A Collusion Detector Based on Fuzzy Logic in P2P Trust Model

More Information
  • Published Date: December 14, 2011
  • As peer-to-peer (P2P) applications have achieved enormous success, the security of P2P network is getting more and more concerns. Particularly, the trust problem has become bottleneck because of the open and anonymous nature of P2P network. Trust model provides a security mechanism for P2P network and is proven to play an important role in improving the robustness of P2P network. However, colluding peers pose a serious threat to the security of trust model. For example, colluding peers may subvert the trust model by spreading plenty of false evaluation. Most existing trust models in P2P network are known as completely green hand in handling colluding peers. Some of them pose measures to make colluding attack difficult, but they are far from satisfying mainly because they cannot identify the colluding peers in P2P network. To address the problem, a fuzzy detector of collusion (FDC) is proposed to detect the existence of colluding peers by measuring similarity of peer's behavior. We show how to deploy FDC in distributed P2P network. The simulation results presented show that FDC is considerably effective in detecting and thwarting collusion attack and FDC can help the trust system in P2P network resist threats from colluding attackers.
  • Related Articles

    [1]Wang Jianwei, Hao Zhongxiao. Node Probability Query Algorithm in Probabilistic XML Document Tree[J]. Journal of Computer Research and Development, 2012, 49(4): 785-794.
    [2]Meng Xiangfu, Yan Li, Zhang Wengbo, Ma Zongmin. XML Approximate Query Approach Based on Attribute Units Extension[J]. Journal of Computer Research and Development, 2010, 47(11): 1936-1946.
    [3]Liu Xiping, Wan Changxuan, and Liu Dexi. Effective XML Vague Content and Structure Retrieval and Scoring[J]. Journal of Computer Research and Development, 2010, 47(6): 1070-1078.
    [4]Yang Weidong and Shi Baile. A Survey of XML Stream Management[J]. Journal of Computer Research and Development, 2009, 46(10): 1721-1728.
    [5]Wang Xin, Yuan Xiaojie, Wang Chenying, and Zhang Haiwei. XN-Store: A Storage Scheme for Native XML Databases[J]. Journal of Computer Research and Development, 2008, 45(7).
    [6]Wan Jing, Hao Zhongxiao. Study of Multi-Valued Dependency in Strong Total Order Temporal Scheme with Multiple Time Granularities[J]. Journal of Computer Research and Development, 2008, 45(6).
    [7]Wu Yonghui. The Sufficient and Necessary Condition for No Implicit Redundancies in an XML Schema[J]. Journal of Computer Research and Development, 2007, 44(12): 2106-2111.
    [8]Hao Zhongxiao, Li Yanjuan. Normalization of Temporal Scheme with Respect to Temporal Multivalued Dependency with Multiple Time Granularities[J]. Journal of Computer Research and Development, 2007, 44(5): 853-859.
    [9]Lü Teng, Yan Ping. Functional Dependencies and Inference Rules for XML[J]. Journal of Computer Research and Development, 2005, 42(5): 792-796.
    [10]Zhang Zhongping, Wang Chao, Zhu Yangyong. Constraint-Based Normalization Algorithms for XML Documents[J]. Journal of Computer Research and Development, 2005, 42(5): 755-764.

Catalog

    Article views (736) PDF downloads (545) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return