10
1 Bounding Virus Prolifera tion in P2P Networks wit h a Diverse-Parameter Trust Management Scheme Authors: C. Lin and R. C. Rob erto Source: IEEE Communications L etters, Vol. 13, No. 10, pp. 812-814, 2009 Speaker: Shu-Fen Chiou ( 邱邱邱 )

Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

Embed Size (px)

DESCRIPTION

Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme. Authors: C. Lin and R. C. Roberto Source: IEEE Communications Letters, Vol. 13, No. 10, pp. 812-814, 2009 Speaker: Shu-Fen Chiou ( 邱淑芬 ). Introduction. download. Request file id 3. Introduction. - PowerPoint PPT Presentation

Citation preview

Page 1: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

1

Bounding Virus Proliferation in P2P Networks with aDiverse-Parameter Trust Management Scheme

Authors: C. Lin and R. C. Roberto Source: IEEE Communications Letters, Vol. 13, No. 10, pp. 812-814, 2009Speaker: Shu-Fen Chiou ( 邱淑芬 )

Page 2: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

2

Introduction

Request file id 3

download

Page 3: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

3

Introduction

Bounding the virus proliferation. File reputation table

Reputation value of the file-- F(i, fl) Peer trust table

Peer trust value (high)--Tv(i, j) Infection value (low)--Iv(i, j)

]1,0[

Page 4: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

4

Proposed method

F 1 2 3 4 5 6 7

F 0.5

0.8

0.6

0.4

0.5

0.6

0.7

File reputation table

If F(i, fl)>THR request fileTHR=0.6F(F, 2)=0.8>0.6

File request

Page 5: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

5

Proposed method

File searchF 1 2 3 4 5 6 7

F 0.5

0.8

0.6

0.4

0.5

0.6

0.7

File reputation table

F A B C D E F

Tv 0.8 0.8 0.7 0.5

Iv 0.7 0.1 0.6 0.6

Peer Trust table

If Tv(i, j)>THT trustee peer, search fileTHT=0.5Tv(F, A)=0.8>0.5, Tv(F, B)=0.8>0.5Tv(F, C)=no value, ask E, Tv(E, C)=0.4 <0.5Tv(F, D)=0.7>0.5Tv(F, E)=0.5=0.5

E A B C D E F

Tv 0.7 0.6 0.4 0.7 0.7

Iv 0.7 0.1 0.6 0.8 0.6

Peer Trust table

Page 6: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

6

Proposed method

Post-download update- clean file

F 1 2 3 4 5 6 7

F 0.5

0.8

0.6

0.4

0.5

0.6

0.7

File reputation table

F A B C D E F

Tv 0.8 0.8 0.7 0.5

Iv 0.7 0.1 0.6 0.6

Peer Trust table

Tv(i, j)=αTv(i, j), α>1 α=1.5Tv(F, B)=0.8*1.5=1.2

1.2

Page 7: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

7

Proposed method Post-download update- infected file

F 1 2 3 4 5 6 7

F 0.5

0.8

0.6

0.4

0.5

0.6

0.7

File reputation table

F A B C D E F

Tv 0.8 0.8 0.7 0.5

Iv 0.7 0.1 0.6 0.6

Peer Trust table

Tv(i, j)=δTv(i, j), 0<δ<1Iv(i, j)=Iv(i, j)+lF(i, fl)=F(i, fl)+1 δ=0.4Tv(F, B)=0.8*0.4=0.32Iv(F, B)=0.1+1=1.1F(F, 2)=0.8+1=1.8

0.321.1

1.8

IF Tv(i, j)<THWissue warning messageTHw=0.4, Tv(F, B)<0.4

Warning message:{ID, vj, fl, △, d}{001, B, 2, 0.5, 5 }

Page 8: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

8

Proposed method Post warning update

A 1 2 3 4 5 6 7

F 0.7

0.8

0.5

0.4

0.7

0.6

0.8

File reputation table

A A B C D E F

Tv 0.7 0.8 0.3 0.4 0.8

Iv 0.1 0.2 0.8 0.6 0.1

Peer Trust table

0.350.9

1.6

If Tv(i, k)>THT

Tv(i, j)=Tv(i, j)-△Tv(i,j )Iv(i, j)=Iv(i, j)+(d-1)/dF(i, fl)=F(i, fl)+(d-1)/d△= △((d-1)/d)

Warning message:{ID, vj, fl, △, d}{001, B, a.mp3, 0.5, 5 }

THT=0.5Tv(A, F)=0.8>0.5Tv(A, B)=0.7-(0.5*0.7)=0.35Iv(A, B)=0.1+4/5=0.9F(A, 2)=0.8+4/5=1.6△=0.5*4/5=0.4

Warning message:{ {001, B, 2, 0.4, 5 }

Page 9: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

9

Performance analysis

100 nodes, 150 files

Pd=probability of detect virusPI=probability of infected fileFR=File Reputation

Page 10: Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme

10

Performance analysis