Reputation evaluation and trust management techniques are successfully used in the peer-to-peer (P2P) environment due to its notable similarity to the human community. These techniques present a quite efficient solution to cope with some types of malicious activity in P2P networks. Recently, a great number of P2P platforms use Distributed Hash Table (DHT) -based overlay-networks that provide effective lookup and storage mechanisms. However, DHT-based networks are a subject to some particular types of attacks. In this paper we present an analysis of applicability of some reputation evaluation techniques as protection from the malicious activity in DHT-based networks.
Reputation Management Techniques in DHT-based Peer-to-Peer Networks / N., Fedotova; M., Bertucci; Veltri, Luca. - (2007), pp. 1-5. (Intervento presentato al convegno 2nd International Conference on Internet and Web Applications and Services (ICIW'07) tenutosi a Mauritius nel May 13-19, 2007) [10.1109/ICIW.2007.53].
Reputation Management Techniques in DHT-based Peer-to-Peer Networks
VELTRI, Luca
2007-01-01
Abstract
Reputation evaluation and trust management techniques are successfully used in the peer-to-peer (P2P) environment due to its notable similarity to the human community. These techniques present a quite efficient solution to cope with some types of malicious activity in P2P networks. Recently, a great number of P2P platforms use Distributed Hash Table (DHT) -based overlay-networks that provide effective lookup and storage mechanisms. However, DHT-based networks are a subject to some particular types of attacks. In this paper we present an analysis of applicability of some reputation evaluation techniques as protection from the malicious activity in DHT-based networks.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.