Peer-to-peer networks have gained a lot of attention over the last couple of years, mainly due to the popularity of the free multimedia file-sharing program Napster and a legal battle around it. Being open by nature P2P systems represent an ideal environment for various types of malicious intrusions. The problem of securing hosts on P2P network while keeping the openness of the system has been studied extensively over last couple of years but still remains open. Existing solutions based on reputation management either employ centralized algorithms or rely on peers' cooperation on the network. We describe a fully decentralized approach that allows computing peers' reputation based on the traffic between a node and its peers, independently of these peers willingness to cooperate in calculation of their reputation. 1 INTRODUCTION Peer-to-peer (P2P) network systems are increasingly gaining popularity on the Internet. These networks allow individual hosts (peers) to share and distribute various types of information over the Internet. By their nature, P2P networks are structured in a way that allows an open and unsupervised communication between peers. Therefore, these systems are vulnerable to various types of attacks, among which are denial-of-service attacks (DoS) and distribution of viruses. To protect themselves from malicious intentions, hosts should be able to identify reliable peers for communication. Identifying these peers is a challenging task in highly dynamic network environments like P2P networks. In this paper we suggest a solution to this problem based on the notion of trust. We propose a policy for managing traffic in peer-to-peer network based on peers' reputation. We also describe a model for computing this reputation using the trust score based on the peers' interaction with each other. Unlike most existing reputation-based models, our approach does not employ a centralized storage and only produces reputation scores on demand. The proposed solution is fully distributed and does not require any cooperation from the rest of the network. Our model aims to help users to select the most reliable peers whose past behavior shows willingness to participate in a proper functioning of the P2P system and at the same time to anticipate possible attacks from malicious peers by limiting their access to the victim peer's resources. In this paper we focus on a particular type of P2P systems, called Gnutella, which proved to be one of the most popular P2P systems. Furthermore, unlike other popular P2P applications such as KaZaa, the source …
[1]
Mostafa H. Ammar,et al.
A reputation system for peer-to-peer networks
,
2003,
NOSSDAV '03.
[2]
Stephen Hailes,et al.
A distributed trust model
,
1998,
NSPW '97.
[3]
Seungjoon Lee,et al.
Cooperative peer groups in NICE
,
2003,
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4]
Ernesto Damiani,et al.
Choosing reputable servents in a P2P network
,
2002,
WWW.
[5]
J. Frankel,et al.
The gnutella protocol specification v0.4 document revision 1.2
,
2000
.
[6]
Karl Aberer,et al.
Managing trust in a peer-2-peer information system
,
2001,
CIKM '01.
[7]
Hector Garcia-Molina,et al.
The Eigentrust algorithm for reputation management in P2P networks
,
2003,
WWW '03.
[8]
Hector Garcia-Molina,et al.
Query-flood DoS attacks in gnutella
,
2002,
CCS '02.