Skip to main content

Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming

  • Conference paper
  • First Online:
Applications of Evolutionary Computation (EvoApplications 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8602))

Included in the following conference series:

Abstract

Peer-to-peer (P2P) systems have attracted significant interest in recent years. In P2P networks, each peer act as both a server or a client. This characteristic makes peers vulnerable to a wide variety of attacks. Having robust trust management is very critical for such open environments to exclude unreliable peers from the system. This paper investigates the use of genetic programming to asses the trustworthiness of peers without a central authority. A trust management model is proposed in which each peer ranks other peers according to local trust values calculated automatically based on the past interactions and recommendations. The experimental results have shown that the model could successfully identify malicious peers without using a central authority or global trust values and, improve the system performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proc. 10th International Conference on Information and Knowledge Management (CIKM). ACM (2001)

    Google Scholar 

  2. Cornelli, F., Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Choosing reputable servents in a p2p network. In: Proc. of the 11h Int. World Wide Web Conf., May 7–11 (2002)

    Google Scholar 

  3. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proc. of the 12th International Conference on World Wide Web, WWW 2003, pp. 640–651. ACM (2003)

    Google Scholar 

  4. Clip2, The gnutella protocol specification v0.4 (document revision 1.2) (2001). http://www.clip2.com/GnutellaProtocol04.pdf

  5. Selcuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for p2p networks. In: Proc. of the IEEE International Symposium on Cluster Computing and the Grid, CCGRID 2004, pp. 251–258. IEEE Computer Society (2004)

    Google Scholar 

  6. Zhou, R., Hwang, K., Cai, M.: Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans. on Knowl. and Data Eng. 20(9), 1282–1295 (2008)

    Google Scholar 

  7. Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. on Knowl. and Data Eng. 16(7), 843–857 (2004)

    Google Scholar 

  8. Xiao, L., Liu, Y., Ni, L.M.: Improving unstructured peer-to-peer systems by adaptive connection establishment. IEEE Transactions on Computers 54(9), 1091–1103 (2005)

    Article  Google Scholar 

  9. Stakhanova, N., Ferrero, S., Wong, J.S., Cai, Y.: A reputation-based trust management in peer-to-peer network systems. In: ISCA PDCS, ISCA, pp. 510–515 (2004)

    Google Scholar 

  10. Brunskill, E.: Building peer-to-peer systems with chord, a distributed lookup service. In: Proc. of the Eighth Workshop on Hot Topics in Operating Systems, HOTOS 2001, p. 81. IEEE Computer Society (2001)

    Google Scholar 

  11. Damiani, E., Vimercati, D.C.D., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: Proc. of the 9th ACM Conference on Computer and Communications Security, pp. 207–216. ACM Press (2002)

    Google Scholar 

  12. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Managing and sharing servents’ reputations in p2p systems. IEEE Transactions on Knowledge and Data Engineering (TKDE) 15(4) (July/August 2003)

    Google Scholar 

  13. Conner, W., Iyengar, A., Mikalsen, T.A., Rouvellou, I., Nahrstedt, K.: A trust management framework for service-oriented environments. In: WWW 2009. ACM, pp. 891–900 (2009)

    Google Scholar 

  14. Prasad, R.V.V.S.V., Srinivas, V., Kumari, V.V., Raju, K.V.S.V.N.: An effective calculation of reputation in p2p networks. JNW 4(5), 332–342 (2009)

    Google Scholar 

  15. Song, W., Phoha, V.V., Xu, X: An adaptive recommendation trust model in multiagent system. In: IAT. IEEE Computer Society, pp. 462–465 (2004)

    Google Scholar 

  16. Beverly, R., Afergan, M.: Machine learning for efficient neighbor selection in unstructured p2p networks. In: Proc. of the 2nd USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, SYSML 2007, pp. 1:1–1:6. USENIX Association (2007)

    Google Scholar 

  17. Liu, X., Tredan, G., Datta, A.: A generic trust framework for large-scale open systems using machine learning, CoRR, abs/1103.0086 (2011)

    Google Scholar 

  18. Crosbie, M., Stafford, G.: Applying genetic programming to intrusion detection. In: Proc. of AAAI Symposium on Genetic Programming, pp. 1–8. Cambridge, MA (1995)

    Google Scholar 

  19. Abraham, A., Grosan, C.: Evolving intrusion detection systems. In: Genetic Systems Programming: Theory and Experiences, vol. 13, pp. 57–79. Springer (2006)

    Google Scholar 

  20. Wilson, D., Kaur, D.: Knowledge extraction from kdd’99 intrusion data using grammatical evolution. WSEAS Transactions on Information Science and Applications 4, 237–244 (2007)

    Google Scholar 

  21. Sen, S., Clark, J.A.: A grammatical evolution approach to intrusion detection on mobile ad hoc networks. In: Proc. of the Second ACM Conference on Wireless Network Security, pp. 95–102. ACM (2009)

    Google Scholar 

  22. Sen, S., Clark, J.: Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks 55(15), 3441–3457 (2011)

    Article  Google Scholar 

  23. Chen, H., Clark, J.A., Tapiador, J.E., Shaikh, S.A., Chivers, H., Nobles, P.: A Multi-objective Optimisation Approach to IDS Sensor Placement. In: Herrero, A., Gastaldo, P., Zunino, R., Corchado, E. (eds.) CISIS 2009. ASC, vol. 63, pp. 101–108. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  24. Selvaraj, C., Anand, S.: Peer profile based trust model for p2p systems using genetic algorithm. Peer-to-Peer Networking and Applications 5(1), 92–103 (2012)

    Article  Google Scholar 

  25. Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)

    MATH  Google Scholar 

  26. Banzhaf, W., Francone, F.D., Keller, R.E., Nordin, P.: Genetic programming: an introduction: on the automatic evolution of computer programs and its applications. Morgan Kaufmann Publishers Inc., San Francisco (1998)

    MATH  Google Scholar 

  27. Hall, M.A.: Correlation-based feature selection for machine learning, Ph.D. dissertation (1999)

    Google Scholar 

  28. Can, A.B., Bhargava, B.: Sort: A self-organizing trust model for peer-to-peer systems. IEEE Trans. Dependable Sec. Comput. 10(1), 14–27 (2013)

    Article  Google Scholar 

  29. Cramer, N.L.: A representation for the adaptive generation of simple sequential programs. In: Grefenstette, J.J. (ed.) ICGA, pp. 183–187. Lawrence Erlbaum Associates (1985)

    Google Scholar 

  30. Ecj 21: A java-based evolutionary computation and genetic programming research system (2013). http://www.cs.umd.edu/projects/plus/ec/ecj/

  31. Dellarocas, C., Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proc. of the 2nd ACM Conference on Electronic Commerce, EC 2000, pp. 150–157. ACM (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ugur Eray Tahta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tahta, U.E., Can, A.B., Sen, S. (2014). Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming. In: Esparcia-Alcázar, A., Mora, A. (eds) Applications of Evolutionary Computation. EvoApplications 2014. Lecture Notes in Computer Science(), vol 8602. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45523-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45523-4_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45522-7

  • Online ISBN: 978-3-662-45523-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics