tailieunhanh - Computer Security: Chapter 8 - Trust in P2P Systems
Computer Security: Chapter 8 - Trust in P2P Systems Introduction about Mitigating Attacks in P2P Systems, Assumptions for Peer Interactions; Contexts of Trust in P2P Systems, Definitions for the Proposed Solution, Trust Metrics, Trust-based Decisions,. | 8. Trust in P2P Systems Prof. Bharat Bhargava Center for Education and Research in Information Assurance and Security (CERIAS) and Department of Computer Sciences Purdue University bb@ Collaborators in the RAID Lab (): Mr. Ahmet Burak Can (. Student) Trust in P2P Systems Outline 1) Introduction ) Mitigating Attacks in P2P Systems ) Assumptions for Peer Interactions 2) Contexts of Trust in P2P Systems 3) Definitions for the Proposed Solution 4) Trust Metrics 5) Trust-based Decisions 6) Interaction Evaluation by Peers 7) Recommendation Evaluation by Peers 8) Simulation Experiments ) Attacker Models for Simulation: Individual attackers/ Collaborators / Pseudospoofers ) Experimental Results 1) Introduction ) Mitigating Attacks in P2P Systems Mitigating attacks in a malicious P2P environment Use trust relationships among peers to mitigate attacks in a malicious P2P environment Algorithms are needed to establish trust among peers Research tasks: Propose trust metrics that reflect all aspects of trust. Develop distributed algorithms to manage trust relationships among peers and help them to make decisions using trust metrics Define methods to evaluate interactions and trust information exchanged among peers (recommendations) ) Assumptions for Peer Interactions Peers use no a priori information to establish trust No pre-existing trust relationships among peers A peer must contribute and behave well to gain and preserve trust of another peer Malicious behavior of Peer 1 against Peer 2 can easily destroy trust of Peer 2 in Peer 1 Trust metrics should have sufficient precision Required to rank peers accurately (according their trustworthiness) 2) Contexts of Trust in P2P Systems Two contexts of trust — . performing 2 different tasks: Providing services to other peers Giving recommendations to other peers . These contexts considered separately A peer might . | 8. Trust in P2P Systems Prof. Bharat Bhargava Center for Education and Research in Information Assurance and Security (CERIAS) and Department of Computer Sciences Purdue University bb@ Collaborators in the RAID Lab (): Mr. Ahmet Burak Can (. Student) Trust in P2P Systems Outline 1) Introduction ) Mitigating Attacks in P2P Systems ) Assumptions for Peer Interactions 2) Contexts of Trust in P2P Systems 3) Definitions for the Proposed Solution 4) Trust Metrics 5) Trust-based Decisions 6) Interaction Evaluation by Peers 7) Recommendation Evaluation by Peers 8) Simulation Experiments ) Attacker Models for Simulation: Individual attackers/ Collaborators / Pseudospoofers ) Experimental Results 1) Introduction ) Mitigating Attacks in P2P Systems Mitigating attacks in a malicious P2P environment Use trust relationships among peers to mitigate attacks in a malicious P2P environment Algorithms are
đang nạp các trang xem trước