DOI QR코드

DOI QR Code

A new security model in p2p network based on Rough set and Bayesian learner

  • Wang, Hai-Sheng (School of Electronic and Information Engineering, Xi'an Jiaotong University) ;
  • Gui, Xiao-Lin (School of Computer Science and Engineering, Xi'an University of Technology)
  • Received : 2012.04.17
  • Accepted : 2012.08.16
  • Published : 2012.09.30

Abstract

A new security management model based on Rough set and Bayesian learner is proposed in the paper. The model focuses on finding out malicious nodes and getting them under control. The degree of dissatisfaction (DoD) is defined as the probability that a node belongs to the malicious node set. Based on transaction history records local DoD (LDoD) is calculated. And recommended DoD (RDoD) is calculated based on feedbacks on recommendations (FBRs). According to the DoD, nodes are classified and controlled. In order to improve computation accuracy and efficiency of the probability, we employ Rough set combined with Bayesian learner. For the reason that in some cases, the corresponding probability result can be determined according to only one or two attribute values, the Rough set module is used; And in other cases, the probability is computed by Bayesian learner. Compared with the existing trust model, the simulation results demonstrate that the model can obtain higher examination rate of malicious nodes and achieve the higher transaction success rate.

Keywords

References

  1. GUO Xiao-qiong and GUAN Hai-bing, "A Trust Management Model Based On Bayesian Network". Information Security and Communications Privacy, vol. 02, 2008.
  2. Tian jun-feng and Tian rui, "A fine-grain trust model based on domain and bayesian network for P2P E-Commerce system," Journal Of Computer Research And Development, vol.20, 2010.
  3. Yu Zhihua, "Analysis of malicious behaviors in peer-topeer trust model". Computer Engineering and Applications, vol.43, no.13, pp.18-21 2007.
  4. M. Srivatsa and L. Liu, "Securing decentralized reputation management using TrustGuard", Journal of Parallel and Distributed Computing, vol.66, no.9, pp.1217-1232, 2006. https://doi.org/10.1016/j.jpdc.2006.04.003
  5. Y. Sun, Z. Han, W. Yu and K.J.R. Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks", in Proc. of the 25th IEEE Conference on Computer Communication, pp.230-236, 2006.
  6. A.A. Selcuk, E. Uzun and M.R. Pariente, "A reputation-based trust management system for P2P networks," International Journal of Network Security, vol.6, no.3, pp.235-245 2008.
  7. M. Mordacchini, R. Baraglia, P. Dazzi and L. Ricci, "A P2P recommender system based on gossip overlays PREGO", in Proc. of the 10th IEEE International Conference on Computers and Information Technology, pp.83-91, 2010.
  8. Zhang Q, Zhang X, Wen X Z, Liu J R, et al., "Construction of peer-to-peer multiple-grain trust model". Journal of Software, vol 17, no.1, pp.96-107, 2006. https://doi.org/10.1360/jos170096
  9. Song Shan-shan, Huang Kai and Zhou Run-fang, "Trusted P2P transactions with fuzzy reputation aggregation," Internet Computing, vol.9, no.6, pp.24-34 2005. https://doi.org/10.1109/MIC.2005.136
  10. Li Xiao-yong, Gui Xiao-Lin and Zhao Juan, "Novel scalable aggregation algorithm of feedback trust information," Journal of Xi'an JiaoTong University, vol. 41, no.8, pp.142-146 2007.
  11. Tian Chun-qi Zou Shi-hong and Tian Hui-rong,"A new trust model based on reputation and risk evaluation", Journal of Electronics & Information Technology, vol. 29, no.7, pp.1628-1632, 2007.
  12. Shi Rong-Hua, Xin Jin-jin, "New P2P trust model based on group". Application Research of computers vol.27, no.7, Jul.2010.
  13. Chun-Ta Li, Cheng-Chi Lee and Lian-Jun Wang, "On the security enhancement of an efficient and secure event signature protocol for P2P MMOGs". Lecture Notes in Computer Science, vol.6016, pp.599-609 2010.
  14. Hou-Meng-shu, Lu Xian-liang, Zhou Xu, et al., "A trust model of p2p system based on confirmation theory". Operating Systems Review, vol.39, no.1, pp.56-62, 2005. https://doi.org/10.1145/1044552.1044558
  15. Cassio P. de Campos, Zhi Zeng and Qiang Ji, "Structure learning of Bayesian networks using constraints", in Proc. of the 26th Annual International Conference on Machine Learning, pp.113-120, 2009.
  16. Nurmi, P., "A bayesian framework for online reputation systems". In Proc. of the Advanced Int. Conf. on Telecomm, Guadeloupe, French Caribbean, IEEE Computer Society, 2006.
  17. S. Lim, C. Keung and N. Griffiths, "Towards improved partner selection using recommendations and trust", in: R. Falcone et al. (Eds.), Trust in Agent Societies (TRUST), Lecture Notes in CS, vol. 5396, pp.43-64, 2008.
  18. Jiang Shouxu, and Li Jianzhong, "A reputation-based trust mechanism for P2P e-commerce systems". Journal of Software, vol.18, no.10, pp.2551-2563, 2007. https://doi.org/10.1360/jos182551
  19. Cheng Chien-Fu, Wang Shu-Ching and Liang Tyne, "File consistency problem of file-sharing in peer-to-peer environment". International Journal of Innovative Computing Information And Control, vol.6, pp.601-613, 2010.
  20. Li Xiong and Ling Liu, "Peer Trust- supporting reputation-based trust for peer-to-peer election communities". IEEE transactions on Knowledge and Data Engineering, vol.16, no.7, pp.843- 857, 2004. https://doi.org/10.1109/TKDE.2004.1318566
  21. Chen Chyouhwa, Tsai Chia-Liang and Horng Shi-Jinn, "Exploiting attribute popularity distribution skew to enhance the performance of peer to peer publish/subscribe systems". International Journal of Innovative Computing Information And Control, vol.7, pp.4047-4066 2011.
  22. Li Xiaoyong, Feng Zhou and Xudong Yang,"A multi-dimensional trust evaluation model for large-scale P2P computing". Journal of Parallel and Distributed Computing, vol.71, pp.837-847, 2011. https://doi.org/10.1016/j.jpdc.2011.01.007