Unwanted Traffic Control via Hybrid Trust Management

At the same time as the Internet provides a lot of social value, it is bogged down by unwanted traffic, which is malicious, harmful or unexpected for its receiver. This paper proposes an unwanted traffic control solution through hybrid trust management. It can control unwanted traffic from its source to destinations according to trust evaluation at a Global Trust Operator and traffic and behavior analysis at hosts. Thus, it can support unwanted traffic control in both a distributed and centralized manner and in both a defensive and offensive way. Simulation based evaluation shows that the solution is effective with regard to botnet intrusion, malicious attack of ISP and DDoS intrusion via reflectors.

[1]  Xianchao Zhang,et al.  Automatic seed set expansion for trust propagation based anti-spamming algorithms , 2009, WIDM.

[2]  Tie-Yan Liu,et al.  BrowseRank: letting web users vote for page importance , 2008, SIGIR '08.

[3]  Ram Dantu,et al.  Socio-technical defense against voice spamming , 2007, TAAS.

[4]  Sudhir Aggarwal,et al.  Incorporating accountability into internet email , 2009, SAC '09.

[5]  Yuchun Tang,et al.  Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[6]  Xu Jingdong,et al.  MailTrust: A Mail Reputation Mechanism Based on Improved TrustGuard , 2010, 2010 International Conference on Communications and Mobile Computing.

[7]  Lise Getoor,et al.  Trusting spam reporters: A reporter-based reputation system for email filtering , 2008, TOIS.

[8]  Jimmy McGibney,et al.  A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[9]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[10]  Brian D. Davison,et al.  Topical TrustRank: using topicality to combat web spam , 2006, WWW '06.

[11]  Jianping Wu,et al.  A Trust and Reputation based Anti-SPIM Method , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[13]  Wilfried N. Gansterer,et al.  Multi-Level Reputation-Based Greylisting , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[14]  Bernhard Plattner,et al.  Enhanced Internet security by a distributed traffic control service based on traffic ownership , 2007, J. Netw. Comput. Appl..

[15]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[16]  Wu Liu,et al.  IPGroupRep: A Novel Reputation Based System for Anti-Spam , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[17]  Raimo Kantola,et al.  Unwanted Traffic Control via Global Trust Management , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.