User behaviour trust model to defend denial of service attacks in distributed computational environments

Today, internet with its innumerable resources has become a basic amenity to the sophisticated society. Major accessibility paradigms used in business and informational domains are web and grid services. Any service is viewed as interoperable interactions among the hosts over a network. Many web and grid resources are vulnerable to security attacks and distributed denial of service attack is a threatening one that makes the resources unavailable. This paper addresses this security issue with respect to the trustworthiness of the client nodes participating in internet computing. Proposed solution is focused at making the underlying network reliable for transactions by identifying attack clients based on their behaviour in request participation using a trust model, to substantially prevent them from participating in normal data transactions and to ensure sustainable network. The model is tested with subnets of varying size and varying amount of request traffic and is deployed in active networking environment.

[1]  Diego Gambetta Trust : making and breaking cooperative relations , 1992 .

[2]  Nada Lavrac,et al.  Trust Modeling for Networked Organizations Using Reputation and Collaboration Estimates , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[3]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[4]  David Wetherall,et al.  Improving the performance of distributed applications using active networks , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[5]  David Wetherall,et al.  Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..

[6]  Paolo Avesani,et al.  Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community , 2005, AAAI.

[7]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[8]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[9]  C. Badcock,et al.  Trust : making and breaking cooperative relations , 1989 .

[10]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[11]  Georg Lausen,et al.  Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[12]  Munindar P. Singh,et al.  Developing trust in large-scale peer-to-peer systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.

[13]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[14]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[16]  Ninghui Li,et al.  Denial of service attacks and defenses in decentralized trust management , 2006, 2006 Securecomm and Workshops.