Skip to main content

Establishing Network Reputation via Mechanism Design

  • Conference paper
Book cover Game Theory for Networks (GameNets 2012)

Abstract

In any system of networks, such as the Internet, a network must take some measure of security into account when deciding whether to allow incoming traffic, and how to configure various filters when making routing decisions. Existing methods tend to rely on the quality of specific hosts in making such decisions, resulting in mostly reactive security policies. In this study we investigate the notion of reputation of a network, and focus on constructing mechanisms that incentivizes the participation of networks to provide information about themselves as well as others. Such information is collected by a centralized reputation agent, who then computes a reputation index for each network. We use a simple mechanism to demonstrate that not only a network has the incentive to provide information about itself (even though it is in general not true), but also that this information can help decrease the estimation error.

The work is partially supported by the NSF under grant CIF-0910765 and CNS-121768, and the U.S. Department of Commerce, National Institute of Standards and Technology (NIST) Technology Innovation Program (TIP) under Cooperative Agreement Number 70NANB9H9008.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a Dynamic Reputation System for DNS. In: 19th USENIX Security Symposium (August 2010)

    Google Scholar 

  2. Bailey, M., Cooke, E., Myrick, A., Sinha, S.: Practical Darknet Measurement. In: 40th Annual Conference on Information Sciences and Systems (March 2006)

    Google Scholar 

  3. DShield. How To Submit Your Firewall Logs To DShield (September 2011), http://isc.sans.edu/howto.html

  4. Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust incentive techniques for peer-to-peer networks. In: ACM Conference on Electronic Commerce, pp. 102–111 (2004)

    Google Scholar 

  5. Hanaki, N., Peterhansl, A., Dodds, P., Watts, D.: Cooperation in evolving social networks. Management Science 53(7), 1036–1050 (2007)

    Article  MATH  Google Scholar 

  6. Cisco Systems Inc. SpamCop Blocking List - SCBL (May 2011), http://www.spamcop.net/

  7. Damballa Inc. Damballa Threat Reputation System (May 2011), http://www.damballa.com/

  8. Team Cymru Inc. Malicious Activity Insight (May 2011), http://www.team-cymru.com/Services/Insight/

  9. Kamvar, S., Schlosser, M.T., Molina, H.G.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: International Conference on World Wide Web, pp. 640–651 (2003)

    Google Scholar 

  10. Karir, M., Creyts, K., Mentley, N.: Towards Network Reputation - Analyzing the Makeup of RBLs. In: NANOGG52, Denver, CO (June 2011), http://www.merit.edu/networkresearch/papers/pdf/2011/NANOG52_reputation-nanog.pdf

  11. Barracuda Networks. Barracuda Reputation Blocklist (May 2011), http://www.barracudacentral.org/

  12. The SPAMHAUS project. SBL, XBL, PBL, ZEN Lists ( May 2011), http://www.spamhaus.org/

  13. Ravoaja, A., Anceaume, E.: STORM: A Secure Overlay for P2P Reputation Management. In: International Conference on Self-Adaptive and Self-Organizing Systems, pp. 247–256 (2007)

    Google Scholar 

  14. ShadowServer. The ShadowServer Botnet C&C List (May 2011), http://www.shadowserver.org/

  15. Zhang, Y., van der Schaar, M.: Peer-to-Peer Multimedia Sharing based on Social Norms. Elsevier Journal on Signal Processing: Image Communication Special Issue on Advances in Video Streaming for P2P Networks (to appear)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ardabili, P.N., Liu, M. (2012). Establishing Network Reputation via Mechanism Design. In: Krishnamurthy, V., Zhao, Q., Huang, M., Wen, Y. (eds) Game Theory for Networks. GameNets 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35582-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35582-0_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35581-3

  • Online ISBN: 978-3-642-35582-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics