Upload
basil-sanford
View
10
Download
0
Embed Size (px)
DESCRIPTION
Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme. Authors: C. Lin and R. C. Roberto Source: IEEE Communications Letters, Vol. 13, No. 10, pp. 812-814, 2009 Speaker: Shu-Fen Chiou ( 邱淑芬 ). Introduction. download. Request file id 3. Introduction. - PowerPoint PPT Presentation
Citation preview
1
Bounding Virus Proliferation in P2P Networks with aDiverse-Parameter Trust Management Scheme
Authors: C. Lin and R. C. Roberto Source: IEEE Communications Letters, Vol. 13, No. 10, pp. 812-814, 2009Speaker: Shu-Fen Chiou ( 邱淑芬 )
2
Introduction
Request file id 3
download
3
Introduction
Bounding the virus proliferation. File reputation table
Reputation value of the file-- F(i, fl) Peer trust table
Peer trust value (high)--Tv(i, j) Infection value (low)--Iv(i, j)
]1,0[
4
Proposed method
F 1 2 3 4 5 6 7
F 0.5
0.8
0.6
0.4
0.5
0.6
0.7
File reputation table
If F(i, fl)>THR request fileTHR=0.6F(F, 2)=0.8>0.6
File request
5
Proposed method
File searchF 1 2 3 4 5 6 7
F 0.5
0.8
0.6
0.4
0.5
0.6
0.7
File reputation table
F A B C D E F
Tv 0.8 0.8 0.7 0.5
Iv 0.7 0.1 0.6 0.6
Peer Trust table
If Tv(i, j)>THT trustee peer, search fileTHT=0.5Tv(F, A)=0.8>0.5, Tv(F, B)=0.8>0.5Tv(F, C)=no value, ask E, Tv(E, C)=0.4 <0.5Tv(F, D)=0.7>0.5Tv(F, E)=0.5=0.5
E A B C D E F
Tv 0.7 0.6 0.4 0.7 0.7
Iv 0.7 0.1 0.6 0.8 0.6
Peer Trust table
6
Proposed method
Post-download update- clean file
F 1 2 3 4 5 6 7
F 0.5
0.8
0.6
0.4
0.5
0.6
0.7
File reputation table
F A B C D E F
Tv 0.8 0.8 0.7 0.5
Iv 0.7 0.1 0.6 0.6
Peer Trust table
Tv(i, j)=αTv(i, j), α>1 α=1.5Tv(F, B)=0.8*1.5=1.2
1.2
7
Proposed method Post-download update- infected file
F 1 2 3 4 5 6 7
F 0.5
0.8
0.6
0.4
0.5
0.6
0.7
File reputation table
F A B C D E F
Tv 0.8 0.8 0.7 0.5
Iv 0.7 0.1 0.6 0.6
Peer Trust table
Tv(i, j)=δTv(i, j), 0<δ<1Iv(i, j)=Iv(i, j)+lF(i, fl)=F(i, fl)+1 δ=0.4Tv(F, B)=0.8*0.4=0.32Iv(F, B)=0.1+1=1.1F(F, 2)=0.8+1=1.8
0.321.1
1.8
IF Tv(i, j)<THWissue warning messageTHw=0.4, Tv(F, B)<0.4
Warning message:{ID, vj, fl, △, d}{001, B, 2, 0.5, 5 }
8
Proposed method Post warning update
A 1 2 3 4 5 6 7
F 0.7
0.8
0.5
0.4
0.7
0.6
0.8
File reputation table
A A B C D E F
Tv 0.7 0.8 0.3 0.4 0.8
Iv 0.1 0.2 0.8 0.6 0.1
Peer Trust table
0.350.9
1.6
If Tv(i, k)>THT
Tv(i, j)=Tv(i, j)-△Tv(i,j )Iv(i, j)=Iv(i, j)+(d-1)/dF(i, fl)=F(i, fl)+(d-1)/d△= △((d-1)/d)
Warning message:{ID, vj, fl, △, d}{001, B, a.mp3, 0.5, 5 }
THT=0.5Tv(A, F)=0.8>0.5Tv(A, B)=0.7-(0.5*0.7)=0.35Iv(A, B)=0.1+4/5=0.9F(A, 2)=0.8+4/5=1.6△=0.5*4/5=0.4
Warning message:{ {001, B, 2, 0.4, 5 }
9
Performance analysis
100 nodes, 150 files
Pd=probability of detect virusPI=probability of infected fileFR=File Reputation
10
Performance analysis