Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

Preview:

DESCRIPTION

Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme. Authors: C. Lin and R. C. Roberto Source: IEEE Communications Letters, Vol. 13, No. 10, pp. 812-814, 2009 Speaker: Shu-Fen Chiou ( 邱淑芬 ). Introduction. download. Request file id 3. Introduction. - PowerPoint PPT Presentation

Citation preview

1

Bounding Virus Proliferation in P2P Networks with aDiverse-Parameter Trust Management Scheme

Authors: C. Lin and R. C. Roberto Source: IEEE Communications Letters, Vol. 13, No. 10, pp. 812-814, 2009Speaker: Shu-Fen Chiou ( 邱淑芬 )

2

Introduction

Request file id 3

download

3

Introduction

Bounding the virus proliferation. File reputation table

Reputation value of the file-- F(i, fl) Peer trust table

Peer trust value (high)--Tv(i, j) Infection value (low)--Iv(i, j)

]1,0[

4

Proposed method

F 1 2 3 4 5 6 7

F 0.5

0.8

0.6

0.4

0.5

0.6

0.7

File reputation table

If F(i, fl)>THR request fileTHR=0.6F(F, 2)=0.8>0.6

File request

5

Proposed method

File searchF 1 2 3 4 5 6 7

F 0.5

0.8

0.6

0.4

0.5

0.6

0.7

File reputation table

F A B C D E F

Tv 0.8 0.8 0.7 0.5

Iv 0.7 0.1 0.6 0.6

Peer Trust table

If Tv(i, j)>THT trustee peer, search fileTHT=0.5Tv(F, A)=0.8>0.5, Tv(F, B)=0.8>0.5Tv(F, C)=no value, ask E, Tv(E, C)=0.4 <0.5Tv(F, D)=0.7>0.5Tv(F, E)=0.5=0.5

E A B C D E F

Tv 0.7 0.6 0.4 0.7 0.7

Iv 0.7 0.1 0.6 0.8 0.6

Peer Trust table

6

Proposed method

Post-download update- clean file

F 1 2 3 4 5 6 7

F 0.5

0.8

0.6

0.4

0.5

0.6

0.7

File reputation table

F A B C D E F

Tv 0.8 0.8 0.7 0.5

Iv 0.7 0.1 0.6 0.6

Peer Trust table

Tv(i, j)=αTv(i, j), α>1 α=1.5Tv(F, B)=0.8*1.5=1.2

1.2

7

Proposed method Post-download update- infected file

F 1 2 3 4 5 6 7

F 0.5

0.8

0.6

0.4

0.5

0.6

0.7

File reputation table

F A B C D E F

Tv 0.8 0.8 0.7 0.5

Iv 0.7 0.1 0.6 0.6

Peer Trust table

Tv(i, j)=δTv(i, j), 0<δ<1Iv(i, j)=Iv(i, j)+lF(i, fl)=F(i, fl)+1 δ=0.4Tv(F, B)=0.8*0.4=0.32Iv(F, B)=0.1+1=1.1F(F, 2)=0.8+1=1.8

0.321.1

1.8

IF Tv(i, j)<THWissue warning messageTHw=0.4, Tv(F, B)<0.4

Warning message:{ID, vj, fl, △, d}{001, B, 2, 0.5, 5 }

8

Proposed method Post warning update

A 1 2 3 4 5 6 7

F 0.7

0.8

0.5

0.4

0.7

0.6

0.8

File reputation table

A A B C D E F

Tv 0.7 0.8 0.3 0.4 0.8

Iv 0.1 0.2 0.8 0.6 0.1

Peer Trust table

0.350.9

1.6

If Tv(i, k)>THT

Tv(i, j)=Tv(i, j)-△Tv(i,j )Iv(i, j)=Iv(i, j)+(d-1)/dF(i, fl)=F(i, fl)+(d-1)/d△= △((d-1)/d)

Warning message:{ID, vj, fl, △, d}{001, B, a.mp3, 0.5, 5 }

THT=0.5Tv(A, F)=0.8>0.5Tv(A, B)=0.7-(0.5*0.7)=0.35Iv(A, B)=0.1+4/5=0.9F(A, 2)=0.8+4/5=1.6△=0.5*4/5=0.4

Warning message:{ {001, B, 2, 0.4, 5 }

9

Performance analysis

100 nodes, 150 files

Pd=probability of detect virusPI=probability of infected fileFR=File Reputation

10

Performance analysis

Recommended