Skip to main content

Analysis on Malicious Peer’s Behavior of the P2P Trust Resource Chain Model

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 149))

Summary

A malicious peer’s behavior is one of the most challenging research areas of the P2P world. Our previous reputation-based trust model approach, which is based on the resource chain model (RCM), prevents malicious peers from spreading malicious contents among the open community. Moreover, a study on the malicious behavior over P2P community leads us to recognize a malicious node. The purpose of this paper is to identify malicious nodes based on the new resource chain model. In addition, the research includes the analysis of behavior of malicious peers on P2P networks. The study on various malicious behavior strengthens the existing resource chain model and allows us to keep P2P network much more reliable and stable.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lee, S., Zhou, S., Kim, Y.: P2P Trust Model: The Resource Chain Model. In: SNPD 2007, Qingdao, China (2007)

    Google Scholar 

  2. Lee, S., Kim, Y.: Analysis of the Resource Chain Model: the New Peer-to-Peer Reputation-Based Trust Model. In: CAINE 2007, San Francisco, USA (2007)

    Google Scholar 

  3. Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: WWW 2003 (May 2003)

    Google Scholar 

  4. Ham, M., Agha, G.: ARA: A Robust Audit to Prevent Free-Riding in P2P Networks. In: Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (2005)

    Google Scholar 

  5. Marti, S., Garcia-Molina, H.: Identity Crisis: Anonymity vs. Reputation in P2P Systems. In: Third International Conference on Peer-to-Peer Computing (P2P 2003), Sweden (2003)

    Google Scholar 

  6. Jin, X., Chan, S., Yiu, W., Xiong, Y., Zhang, Q.: Detecting malicious hosts in the presence of lying hosts in peer-to-peer streaming. In: Proceedings of IEEE International Conference on Multimedia Expo (ICME), Toronto, Canada, July 9-12, 2006, pp. 1537–1540 (2006)

    Google Scholar 

  7. Singh, A., Castro, M., Druschel, P., Rowstron, A.: Defending against Eclipse attacks on overay networks. In: Proc. SIGOPS EW 2004 (2004)

    Google Scholar 

  8. Park, S., Liu, L., Pu, C., Srivasta, M., Zhang, J.: Resilient Trust Management for Web Service Integration. In: Proceedings of the 3rd IEEE International Conference on Web Services, ICWS (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Roger Lee

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lee, S., Zhu, S., Kim, Y., Chang, J. (2008). Analysis on Malicious Peer’s Behavior of the P2P Trust Resource Chain Model. In: Lee, R. (eds) Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing. Studies in Computational Intelligence, vol 149. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70560-4_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-70560-4_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-70559-8

  • Online ISBN: 978-3-540-70560-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics