Summary
A malicious peer’s behavior is one of the most challenging research areas of the P2P world. Our previous reputation-based trust model approach, which is based on the resource chain model (RCM), prevents malicious peers from spreading malicious contents among the open community. Moreover, a study on the malicious behavior over P2P community leads us to recognize a malicious node. The purpose of this paper is to identify malicious nodes based on the new resource chain model. In addition, the research includes the analysis of behavior of malicious peers on P2P networks. The study on various malicious behavior strengthens the existing resource chain model and allows us to keep P2P network much more reliable and stable.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Lee, S., Zhou, S., Kim, Y.: P2P Trust Model: The Resource Chain Model. In: SNPD 2007, Qingdao, China (2007)
Lee, S., Kim, Y.: Analysis of the Resource Chain Model: the New Peer-to-Peer Reputation-Based Trust Model. In: CAINE 2007, San Francisco, USA (2007)
Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: WWW 2003 (May 2003)
Ham, M., Agha, G.: ARA: A Robust Audit to Prevent Free-Riding in P2P Networks. In: Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (2005)
Marti, S., Garcia-Molina, H.: Identity Crisis: Anonymity vs. Reputation in P2P Systems. In: Third International Conference on Peer-to-Peer Computing (P2P 2003), Sweden (2003)
Jin, X., Chan, S., Yiu, W., Xiong, Y., Zhang, Q.: Detecting malicious hosts in the presence of lying hosts in peer-to-peer streaming. In: Proceedings of IEEE International Conference on Multimedia Expo (ICME), Toronto, Canada, July 9-12, 2006, pp. 1537–1540 (2006)
Singh, A., Castro, M., Druschel, P., Rowstron, A.: Defending against Eclipse attacks on overay networks. In: Proc. SIGOPS EW 2004 (2004)
Park, S., Liu, L., Pu, C., Srivasta, M., Zhang, J.: Resilient Trust Management for Web Service Integration. In: Proceedings of the 3rd IEEE International Conference on Web Services, ICWS (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Lee, S., Zhu, S., Kim, Y., Chang, J. (2008). Analysis on Malicious Peer’s Behavior of the P2P Trust Resource Chain Model. In: Lee, R. (eds) Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Studies in Computational Intelligence, vol 149. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70560-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-70560-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-70559-8
Online ISBN: 978-3-540-70560-4
eBook Packages: EngineeringEngineering (R0)