Browse > Article
http://dx.doi.org/10.3837/tiis.2012.09.023

A new security model in p2p network based on Rough set and Bayesian learner  

Wang, Hai-Sheng (School of Electronic and Information Engineering, Xi'an Jiaotong University)
Gui, Xiao-Lin (School of Computer Science and Engineering, Xi'an University of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.6, no.9, 2012 , pp. 2370-2387 More about this Journal
Abstract
A new security management model based on Rough set and Bayesian learner is proposed in the paper. The model focuses on finding out malicious nodes and getting them under control. The degree of dissatisfaction (DoD) is defined as the probability that a node belongs to the malicious node set. Based on transaction history records local DoD (LDoD) is calculated. And recommended DoD (RDoD) is calculated based on feedbacks on recommendations (FBRs). According to the DoD, nodes are classified and controlled. In order to improve computation accuracy and efficiency of the probability, we employ Rough set combined with Bayesian learner. For the reason that in some cases, the corresponding probability result can be determined according to only one or two attribute values, the Rough set module is used; And in other cases, the probability is computed by Bayesian learner. Compared with the existing trust model, the simulation results demonstrate that the model can obtain higher examination rate of malicious nodes and achieve the higher transaction success rate.
Keywords
Degree of Dissatisfaction; Rough set; Bayesian learner; Information entropy;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
연도 인용수 순위
  • Reference
1 GUO Xiao-qiong and GUAN Hai-bing, "A Trust Management Model Based On Bayesian Network". Information Security and Communications Privacy, vol. 02, 2008.
2 Tian jun-feng and Tian rui, "A fine-grain trust model based on domain and bayesian network for P2P E-Commerce system," Journal Of Computer Research And Development, vol.20, 2010.
3 Yu Zhihua, "Analysis of malicious behaviors in peer-topeer trust model". Computer Engineering and Applications, vol.43, no.13, pp.18-21 2007.
4 M. Srivatsa and L. Liu, "Securing decentralized reputation management using TrustGuard", Journal of Parallel and Distributed Computing, vol.66, no.9, pp.1217-1232, 2006.   DOI   ScienceOn
5 Y. Sun, Z. Han, W. Yu and K.J.R. Liu, "A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks", in Proc. of the 25th IEEE Conference on Computer Communication, pp.230-236, 2006.
6 A.A. Selcuk, E. Uzun and M.R. Pariente, "A reputation-based trust management system for P2P networks," International Journal of Network Security, vol.6, no.3, pp.235-245 2008.
7 M. Mordacchini, R. Baraglia, P. Dazzi and L. Ricci, "A P2P recommender system based on gossip overlays PREGO", in Proc. of the 10th IEEE International Conference on Computers and Information Technology, pp.83-91, 2010.
8 Zhang Q, Zhang X, Wen X Z, Liu J R, et al., "Construction of peer-to-peer multiple-grain trust model". Journal of Software, vol 17, no.1, pp.96-107, 2006.   DOI
9 Song Shan-shan, Huang Kai and Zhou Run-fang, "Trusted P2P transactions with fuzzy reputation aggregation," Internet Computing, vol.9, no.6, pp.24-34 2005.   DOI   ScienceOn
10 Li Xiao-yong, Gui Xiao-Lin and Zhao Juan, "Novel scalable aggregation algorithm of feedback trust information," Journal of Xi'an JiaoTong University, vol. 41, no.8, pp.142-146 2007.
11 Tian Chun-qi Zou Shi-hong and Tian Hui-rong,"A new trust model based on reputation and risk evaluation", Journal of Electronics & Information Technology, vol. 29, no.7, pp.1628-1632, 2007.
12 Shi Rong-Hua, Xin Jin-jin, "New P2P trust model based on group". Application Research of computers vol.27, no.7, Jul.2010.
13 Chun-Ta Li, Cheng-Chi Lee and Lian-Jun Wang, "On the security enhancement of an efficient and secure event signature protocol for P2P MMOGs". Lecture Notes in Computer Science, vol.6016, pp.599-609 2010.
14 Hou-Meng-shu, Lu Xian-liang, Zhou Xu, et al., "A trust model of p2p system based on confirmation theory". Operating Systems Review, vol.39, no.1, pp.56-62, 2005.   DOI   ScienceOn
15 Cassio P. de Campos, Zhi Zeng and Qiang Ji, "Structure learning of Bayesian networks using constraints", in Proc. of the 26th Annual International Conference on Machine Learning, pp.113-120, 2009.
16 Nurmi, P., "A bayesian framework for online reputation systems". In Proc. of the Advanced Int. Conf. on Telecomm, Guadeloupe, French Caribbean, IEEE Computer Society, 2006.
17 S. Lim, C. Keung and N. Griffiths, "Towards improved partner selection using recommendations and trust", in: R. Falcone et al. (Eds.), Trust in Agent Societies (TRUST), Lecture Notes in CS, vol. 5396, pp.43-64, 2008.
18 Jiang Shouxu, and Li Jianzhong, "A reputation-based trust mechanism for P2P e-commerce systems". Journal of Software, vol.18, no.10, pp.2551-2563, 2007.   DOI   ScienceOn
19 Cheng Chien-Fu, Wang Shu-Ching and Liang Tyne, "File consistency problem of file-sharing in peer-to-peer environment". International Journal of Innovative Computing Information And Control, vol.6, pp.601-613, 2010.
20 Li Xiong and Ling Liu, "Peer Trust- supporting reputation-based trust for peer-to-peer election communities". IEEE transactions on Knowledge and Data Engineering, vol.16, no.7, pp.843- 857, 2004.   DOI   ScienceOn
21 Li Xiaoyong, Feng Zhou and Xudong Yang,"A multi-dimensional trust evaluation model for large-scale P2P computing". Journal of Parallel and Distributed Computing, vol.71, pp.837-847, 2011.   DOI   ScienceOn
22 Chen Chyouhwa, Tsai Chia-Liang and Horng Shi-Jinn, "Exploiting attribute popularity distribution skew to enhance the performance of peer to peer publish/subscribe systems". International Journal of Innovative Computing Information And Control, vol.7, pp.4047-4066 2011.