Abstract
Peer-to-peer (P2P) systems have attracted significant interest in recent years. In P2P networks, each peer act as both a server or a client. This characteristic makes peers vulnerable to a wide variety of attacks. Having robust trust management is very critical for such open environments to exclude unreliable peers from the system. This paper investigates the use of genetic programming to asses the trustworthiness of peers without a central authority. A trust management model is proposed in which each peer ranks other peers according to local trust values calculated automatically based on the past interactions and recommendations. The experimental results have shown that the model could successfully identify malicious peers without using a central authority or global trust values and, improve the system performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proc. 10th International Conference on Information and Knowledge Management (CIKM). ACM (2001)
Cornelli, F., Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Choosing reputable servents in a p2p network. In: Proc. of the 11h Int. World Wide Web Conf., May 7–11 (2002)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proc. of the 12th International Conference on World Wide Web, WWW 2003, pp. 640–651. ACM (2003)
Clip2, The gnutella protocol specification v0.4 (document revision 1.2) (2001). http://www.clip2.com/GnutellaProtocol04.pdf
Selcuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for p2p networks. In: Proc. of the IEEE International Symposium on Cluster Computing and the Grid, CCGRID 2004, pp. 251–258. IEEE Computer Society (2004)
Zhou, R., Hwang, K., Cai, M.: Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans. on Knowl. and Data Eng. 20(9), 1282–1295 (2008)
Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. on Knowl. and Data Eng. 16(7), 843–857 (2004)
Xiao, L., Liu, Y., Ni, L.M.: Improving unstructured peer-to-peer systems by adaptive connection establishment. IEEE Transactions on Computers 54(9), 1091–1103 (2005)
Stakhanova, N., Ferrero, S., Wong, J.S., Cai, Y.: A reputation-based trust management in peer-to-peer network systems. In: ISCA PDCS, ISCA, pp. 510–515 (2004)
Brunskill, E.: Building peer-to-peer systems with chord, a distributed lookup service. In: Proc. of the Eighth Workshop on Hot Topics in Operating Systems, HOTOS 2001, p. 81. IEEE Computer Society (2001)
Damiani, E., Vimercati, D.C.D., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: Proc. of the 9th ACM Conference on Computer and Communications Security, pp. 207–216. ACM Press (2002)
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Managing and sharing servents’ reputations in p2p systems. IEEE Transactions on Knowledge and Data Engineering (TKDE) 15(4) (July/August 2003)
Conner, W., Iyengar, A., Mikalsen, T.A., Rouvellou, I., Nahrstedt, K.: A trust management framework for service-oriented environments. In: WWW 2009. ACM, pp. 891–900 (2009)
Prasad, R.V.V.S.V., Srinivas, V., Kumari, V.V., Raju, K.V.S.V.N.: An effective calculation of reputation in p2p networks. JNW 4(5), 332–342 (2009)
Song, W., Phoha, V.V., Xu, X: An adaptive recommendation trust model in multiagent system. In: IAT. IEEE Computer Society, pp. 462–465 (2004)
Beverly, R., Afergan, M.: Machine learning for efficient neighbor selection in unstructured p2p networks. In: Proc. of the 2nd USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, SYSML 2007, pp. 1:1–1:6. USENIX Association (2007)
Liu, X., Tredan, G., Datta, A.: A generic trust framework for large-scale open systems using machine learning, CoRR, abs/1103.0086 (2011)
Crosbie, M., Stafford, G.: Applying genetic programming to intrusion detection. In: Proc. of AAAI Symposium on Genetic Programming, pp. 1–8. Cambridge, MA (1995)
Abraham, A., Grosan, C.: Evolving intrusion detection systems. In: Genetic Systems Programming: Theory and Experiences, vol. 13, pp. 57–79. Springer (2006)
Wilson, D., Kaur, D.: Knowledge extraction from kdd’99 intrusion data using grammatical evolution. WSEAS Transactions on Information Science and Applications 4, 237–244 (2007)
Sen, S., Clark, J.A.: A grammatical evolution approach to intrusion detection on mobile ad hoc networks. In: Proc. of the Second ACM Conference on Wireless Network Security, pp. 95–102. ACM (2009)
Sen, S., Clark, J.: Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks 55(15), 3441–3457 (2011)
Chen, H., Clark, J.A., Tapiador, J.E., Shaikh, S.A., Chivers, H., Nobles, P.: A Multi-objective Optimisation Approach to IDS Sensor Placement. In: Herrero, A., Gastaldo, P., Zunino, R., Corchado, E. (eds.) CISIS 2009. ASC, vol. 63, pp. 101–108. Springer, Heidelberg (2009)
Selvaraj, C., Anand, S.: Peer profile based trust model for p2p systems using genetic algorithm. Peer-to-Peer Networking and Applications 5(1), 92–103 (2012)
Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)
Banzhaf, W., Francone, F.D., Keller, R.E., Nordin, P.: Genetic programming: an introduction: on the automatic evolution of computer programs and its applications. Morgan Kaufmann Publishers Inc., San Francisco (1998)
Hall, M.A.: Correlation-based feature selection for machine learning, Ph.D. dissertation (1999)
Can, A.B., Bhargava, B.: Sort: A self-organizing trust model for peer-to-peer systems. IEEE Trans. Dependable Sec. Comput. 10(1), 14–27 (2013)
Cramer, N.L.: A representation for the adaptive generation of simple sequential programs. In: Grefenstette, J.J. (ed.) ICGA, pp. 183–187. Lawrence Erlbaum Associates (1985)
Ecj 21: A java-based evolutionary computation and genetic programming research system (2013). http://www.cs.umd.edu/projects/plus/ec/ecj/
Dellarocas, C., Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proc. of the 2nd ACM Conference on Electronic Commerce, EC 2000, pp. 150–157. ACM (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tahta, U.E., Can, A.B., Sen, S. (2014). Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming. In: Esparcia-Alcázar, A., Mora, A. (eds) Applications of Evolutionary Computation. EvoApplications 2014. Lecture Notes in Computer Science(), vol 8602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45523-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-662-45523-4_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45522-7
Online ISBN: 978-3-662-45523-4
eBook Packages: Computer ScienceComputer Science (R0)