Computer Security: Chapter 8 - Trust in P2P Systems Introduction about Mitigating Attacks in P2P Systems, Assumptions for Peer Interactions; Contexts of Trust in P2P Systems, Definitions for the Proposed Solution, Trust Metrics, Trust-based Decisions,...
Trang 1Prof. Bharat Bhargava Center for Education and Research in Information Assurance and Security (CERIAS)
and Department of Computer Sciences
Purdue University http://www.cs.purdue.edu/people/bb bb@cs.purdue.edu
Trang 3 Propose trust metrics that reflect all aspects of trust.
Develop distributed algorithms to manage trust relationships among peers and help them to make decisions using trust metrics
Define methods to evaluate interactions and trust information
Trang 4 Trust metrics should have sufficient precision
Required to rank peers accurately (according their
Trang 5 Two contexts of trust — w.r.t. performing 2 different
tasks:
1) Providing services to other peers
2) Giving recommendations to other peers
These contexts considered separately
A peer might simultaneously be a good service
provider and a bad recommender (or vice versa)
Trang 6 A recommendation represents the acquaintance’s trust
information about a stranger
A peer requests recommendations about a stranger only from its acquaintances
Receiving a recommendation from an acquaintance is a
recommendation interaction
Trang 8 Recommendation trust metric of a peer calculated based on past recommendation interactions and its reputation
Analogously to service trust metric
Trang 9 When making trust decisions, interactions and reputation are considered separately
This helps when making a distinction between two trustworthy peers
Trust decisions about a stranger are based on reputation
Trust decisions about an acquaintance are based on its past interactions and reputation
As more interactions happen with an acquaintance, the experience derived through interactions becomes more important than its reputation
Trang 10 Using available acquaintances by a peer
If no acquaintances simply trust any stranger
As more acquaintances become available – can
become more selective
Trang 11 Using all available information about interactions is helpful
to calculate trust metrics more precisely
A peer should be able to express its level of satisfaction about an interaction
Considering several parameters
E.g., online/offline periods, bandwidth, delay of the uploader in a file download operation
Service interactions might have varying importance
E.g., downloading a large file more important than downloading
a small file
The effect of an interaction on trust calculation fades as new interactions occur
Trang 12 If the recommender has a low confidence , the recommendation is
Trang 14 Unfairly low recommendation: Giving a negativelybiased trust value about the recommended peer
Three types of attackers:
a) Individual attackers
b) Collaborators
Trang 15 It treats all other peers fairly
Hypocritical attacker uploads infected/inauthentic files
Trang 16 Collaborators — malicious peers that coordinate attacks with other peers
Three collaborator behaviors (analogous as for individual
Trang 17 Pseudospoofer — a malicious peer which changes its pseudonym periodically to escape from being identified
A pseudospoofer behaviors:
Nạve / discriminatory / hypocritical
Analogous to individual attacker behaviors
Trang 18 In a nonmalicious network, reputation of a peer is
proportional to its capabilities such as network bandwidth, average online period on the network and number of
shared resources
In a malicious network, service and recommendation
based attacks affect reputation of a peer
Trang 19a) Results for Individual Attackers
All attacks of individual attackers are mitigated easily
Hypocritical attacks take more time to detect than other individual attackers
Trang 20b) Results for Collaborators (1)
Detection of collaborators usually takes longer than
detection of an individual attacker
Unfairly high recommendations provides an advantage except nạve collaborators
Nạve collaborators do not benefit from collaboration
They have zero reputation since they can not complete any service interaction
Hence they are not requested for any recommendations
Collaboration is partially successful in hypocritical and
discriminatory behaviors
Trang 21 As good peers gain more good acquaintances, hypocritical collaborators are identified (and their attacks mitigated)
Trang 24 Defining a context of trust increases a peer's ability to identify and mitigate attacks on the contextrelated tasks
Context of trust can be used to increase a peer’s
reasoning ability for different tasks
Such as routing, integrity checking and protecting privacy
Trang 25THE END