GenTrust: A genetic trust management model for peer-to-peer systems

Abstract In recent years, peer-to-peer systems have attracted significant interest by offering diverse and easily accessible sharing environments to users. However, this flexibility of P2P systems introduces security vulnerabilities. Peers often interact with unknown or unfamiliar peers and become vulnerable to a wide variety of attacks. Therefore, having a robust trust management model is critical for such open environments in order to exclude unreliable peers from the system. In this study, a new trust model for peer-to-peer networks called GenTrust is proposed. GenTrust has evolved by using genetic programming. In this model, a peer calculates the trustworthiness of another peer based on the features extracted from past interactions and the recommendations. Since the proposed model does not rely on any central authority or global trust values, it suits the decentralized nature of P2P networks. Moreover, the experimental results show that the model is very effective against various attackers, namely individual, collaborative, and pseudospoofing attackers. An analysis on features is also carried out in order to explore their effects on the results. This is the first study which investigates the use of genetic programming on trust management.

[1]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[2]  Xin Xu,et al.  An adaptive recommendation trust model in multiagent system , 2004 .

[3]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[4]  Gayatri Swamynathan,et al.  Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System , 2005, ISPA Workshops.

[5]  Lakshminarayanan Subramanian,et al.  Sybil-Resilient Online Content Voting , 2009, NSDI.

[6]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[7]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[8]  Ajith Abraham,et al.  Evolving Intrusion Detection Systems , 2006, Genetic Systems Programming.

[9]  Eugene H. Spafford,et al.  Applying Genetic Programming to Intrusion Detection , 1995 .

[10]  Karl Aberer,et al.  Trust-Aware Delivery of Composite Goods , 2002, AP2PC.

[11]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[12]  Sheila Anand,et al.  Peer profile based trust model for P2P systems using genetic algorithm , 2012, Peer Peer Netw. Appl..

[13]  Chris Cornelis,et al.  Gradual trust and distrust in recommender systems , 2009, Fuzzy Sets Syst..

[14]  Chithra Selvaraj,et al.  A Role Based Trust Model for Peer to Peer Systems Using Credential Trees , 2011 .

[15]  Mark A. Hall,et al.  Correlation-based Feature Selection for Machine Learning , 2003 .

[16]  John A. Clark,et al.  A Multi-objective Optimisation Approach to IDS Sensor Placement , 2009, CISIS.

[17]  Vijay Kumar,et al.  Building Trust and Security in Peer-to-Peer Systems , 2007, Secure Data Management in Decentralized Systems.

[18]  Ernesto Damiani,et al.  Managing and Sharing Servents' Reputations in P2P Systems , 2003, IEEE Trans. Knowl. Data Eng..

[20]  Krishna P. Gummadi,et al.  Measurement study of peer-to-peer file system sharing , 2002 .

[21]  John A. Clark,et al.  A grammatical evolution approach to intrusion detection on mobile ad hoc networks , 2009, WiSec '09.

[22]  Peter Nordin,et al.  Genetic programming - An Introduction: On the Automatic Evolution of Computer Programs and Its Applications , 1998 .

[23]  Valentin Cristea,et al.  Decentralized Trust Management in Peer-to-Peer Systems , 2011, 2011 10th International Symposium on Parallel and Distributed Computing.

[24]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[25]  Svein J. Knapskog,et al.  Learning Trust in Dynamic Multiagent Environments using HMMs. , 2008 .

[26]  Vladimiro Sassone,et al.  HMM-Based Trust Model , 2009, Formal Aspects in Security and Trust.

[27]  John R. Koza,et al.  Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.

[28]  Raouf Boutaba,et al.  Reputation-Based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy , 2010 .

[29]  Ahmet Burak Can,et al.  Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming , 2014, EvoApplications.

[30]  Xin Liu,et al.  A GENERIC TRUST FRAMEWORK FOR LARGE‐SCALE OPEN SYSTEMS USING MACHINE LEARNING , 2011, Comput. Intell..

[31]  Klara Nahrstedt,et al.  A trust management framework for service-oriented environments , 2009, WWW '09.

[32]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[33]  Xu Wu A distributed trust management model for mobile P2P networks , 2012, Peer Peer Netw. Appl..

[34]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[35]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[36]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[37]  Julita Vassileva,et al.  Bayesian Network Trust Model in Peer-to-Peer Networks , 2003, AP2PC.

[38]  David B. Fogel What is evolutionary computation , 1995 .

[39]  John A. Clark,et al.  Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.

[40]  Stephen P. Boyd,et al.  Randomized gossip algorithms , 2006, IEEE Transactions on Information Theory.

[41]  Xin Xu,et al.  An adaptive recommendation trust model in multiagent system , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..

[42]  Robert Beverly,et al.  Machine learning for efficient neighbor selection in unstructured P2P networks , 2007 .

[43]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[44]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[45]  Kai Hwang,et al.  GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks , 2008, IEEE Transactions on Knowledge and Data Engineering.

[46]  Audun Jsang,et al.  Analysing topologies of transitive trust , 2003 .

[47]  Sevil Sen,et al.  A Survey of Intrusion Detection Systems Using Evolutionary Computation , 2015 .

[48]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[49]  Krishna P. Gummadi,et al.  An analysis of Internet content delivery systems , 2002, OPSR.

[50]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[51]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.

[52]  Lik Mui,et al.  A Computational Model of Trust and Reputation for E-businesses , 2002 .

[53]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[54]  Vidhyacharan Bhaskar,et al.  A unified trust management strategy for content sharing in Peer-to-Peer networks , 2013 .

[55]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[56]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[57]  Bharat K. Bhargava,et al.  SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[58]  Radu Stoleru,et al.  On the optimality of cooperative intrusion detection for resource constrained wireless networks , 2013, Comput. Secur..

[59]  W. Sweet,et al.  The troubling state of nuclear controls , 2000 .

[60]  Ying Cai,et al.  A Reputation-based Trust Management in Peer-to-Peer Network Systems , 2004, ISCA PDCS.

[61]  Basit Qureshi,et al.  A distributed reputation and trust management scheme for mobile peer-to-peer networks , 2012, Comput. Commun..

[62]  Xin Liu,et al.  Modeling Context Aware Dynamic Trust Using Hidden Markov Model , 2012, AAAI.

[63]  David Gefen,et al.  Reflections on the dimensions of trust and trustworthiness among online consumers , 2002, Data Base.

[64]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[65]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[66]  Philippe Chatalic,et al.  A probabilistic trust model for semantic peer-to-peer systems , 2008, ECAI.

[67]  Juan E. Tapiador,et al.  Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming , 2009, EvoWorkshops.