Implementing a Reputation-Aware Gnutella Servent

  • Fabrizio Cornelli
  • Ernesto Damiani
  • Sabrina De Capitani di Vimercati
  • Stefano Paraboschi
  • Pierangela Samarati
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2376)


We describe the design and implementation of a reputation-aware servent for Gnutella-like peer-to-peer systems.


Query Message Reputation Manager Sybil Attack Secure Hash Function Gnutella Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    S. Bellovin. Security aspects of Napster and Gnutella. In Proc. of USENIX 2001, Boston, June 2001.Google Scholar
  2. 2.
    I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 2000.Google Scholar
  3. 3.
    F. Cornelli, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a P2P network. In Proc. of the Eleventh International World Wide Web Conference, Honolulu, Hawaii, May 2002.Google Scholar
  4. 4.
    R. Dingledine, M.J. Freedman, and D. Molnar. The Free Haven project: Distributed anonymous storage service. In Proc. of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, California, USA, July 2000.Google Scholar
  5. 5.
    J.R. Douceur. The sybil attack. In Proc. of the IPTPS02 Workshop, Cambridge, MA (USA), March 2002.Google Scholar
  6. 6.
    P. Druschel and A. Rowstron. Past: A large-scale persistent peer-to-peer storage utility. In Proc. of the Eight IEEE Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schoss Elmau, Germany, May 2001.Google Scholar
  7. 7.
    P. Golle and K. Leyton-Brown. Incentives for sharing in peer-to-peer networks. In Proc. of the Third ACM Conference on Electronic Commerce, Tampa, Florida, USA, October 2001.Google Scholar
  8. 8.
    L. Gong. JXTA: A network programming environment. IEEE Internet Computing, 5(3):88–95, May/June 2001.Google Scholar
  9. 9.
  10. 10.
    A. Oram, editor. Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly & Associates, March 2001.Google Scholar
  11. 11.
    M. Parameswaran, A. Susarla, and A.B. Whinston. P2P networking: An information-sharing alternative. IEEE Computer, 34(7):31–38, July 2001.Google Scholar
  12. 12.
    M. Ripeanu. Peer-to-peer architecture case study: Gnutella network. Technical Report TR-2001-26, University of Chicago, Department of Computer Science, July 2001.Google Scholar
  13. 13.
    S. Saroiu, P.K. Gummadi, and S.D. Gribble. A measurement study of peer-to-peer file sharing systems. In Proc. of the Multimedia Computing and Networking, San Jose, CA, January 2002.Google Scholar
  14. 14.
    S. Thadani. Meta information searches on the Gnutella network.
  15. 15.
    S. Thadani. Free riding on Gnutella. Technical report, LimeWire LLC, 2001.
  16. 16.
    The Gnutella Protocol Specification v0.4 (Document Revision 1.2), June 2001.
  17. 17.
    B. Yang and H. Garcia-Molina. Comparing hybrid peer-to-peer systems. In Proc. of the 27th International Conference on Very Large Data Bases, Rome, Italy, September 2001.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Fabrizio Cornelli
    • 1
  • Ernesto Damiani
    • 1
  • Sabrina De Capitani di Vimercati
    • 2
  • Stefano Paraboschi
    • 3
  • Pierangela Samarati
    • 1
  1. 1.Dipartimento di Tecnologie dell’InformazioneUniversità di MilanoCremaItaly
  2. 2.Dipartimento di Elettronica per l’AutomazioneUniversità di BresciaBresciaItaly
  3. 3.Dipartimento di Elettronica e InformazionePolitecnico di MilanoMilanoItaly

Personalised recommendations