Supercharge Your Innovation With Domain-Expert AI Agents!

Method for suppressing malicious behavior based on distributed recommendable reputation in peer-to-peer (P2P) network

A P2P network, distributed technology, applied in the network field, can solve the problem of lack of malicious behavior classification and dynamic changes in reputation value

Inactive Publication Date: 2011-04-06
SHANGHAI JIAO TONG UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this technology also adopts the recommended trust model, it mainly focuses on the resistance to malicious nodes, and lacks the specific classification of malicious behaviors and the consideration of dynamic changes in reputation values.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for suppressing malicious behavior based on distributed recommendable reputation in peer-to-peer (P2P) network
  • Method for suppressing malicious behavior based on distributed recommendable reputation in peer-to-peer (P2P) network
  • Method for suppressing malicious behavior based on distributed recommendable reputation in peer-to-peer (P2P) network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0081] This embodiment includes the following steps:

[0082] Step 1: Node A requests the owner list of file R from the tracker server. If there is no seeder, try again after blocking for a period of time; if there is a seeder, the current node A queries the local data according to the list returned by the tracker server, and obtains the reputation value of all nodes in the list.

[0083] Such as figure 1 As shown in Fig. 1 , a node wants to download resources, firstly it sends a request to the Tracker server, and the Tracker server responds to the node's request by providing it with a list of IP addresses of other downloaders (including publishers and completers). According to this list, the node queries the reputation of the node that can provide services for itself. The reputation value is composed of direct reputation, indirect reputation and recommended reputation. While all three were previously interrelated, when it comes to building trust, all come from different sou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for suppressing a malicious behavior based on distributed recommendable reputation in a peer-to-peer (P2P) network. The method comprises the following steps: acquiring reputation values of all nodes from a list; calculating the direct reputation of the current node pair B according to a time factor; requesting for providing a recommended value for the reputation of the node B; according to a deviant, determining the honesty of the behavior of a recommender and updating the recommended reputation of the recommender; calculating the indirect reputation of the node B; setting weight distribution parameters, and integrating into final reputation; selecting appropriate nodes, connecting, and downloading a resource; grading the resource, thereby reducing the success probability of deception gangs; and in terms of the deviant behavior of a non-malicious node, detecting and compensating the deviant behavior thereof, thereby ensuring that the reputation of a honest node is maintained at a normal level. The strategies are reasonably distributed in a reputation management framework and can adapt to the randomness and dynamicness of the nodes of the P2P network, so that the final reputation of a user is more real-time, accurate and reliable compared with the traditional evaluation system.

Description

technical field [0001] The invention relates to a method in the field of network technology, in particular to a method for curbing malicious behavior based on a distributed recommendable reputation in a P2P network. Background technique [0002] Existing resource sharing systems that use P2P protocols mostly use traditional reputation systems, such as BTCHINA, VERYCD, Grape, and Thunder. Since the protocol itself is not particularly binding on nodes, most of these websites will use some reputation system to encourage nodes to "share" more. [0003] Take the VERYCD client eMule modified according to the emule mod as an example: each node has a point file, and eMule uses an encryption method key handshake to ensure that a certain point belongs to a certain person correctly. Only after this method is verified by eMule, this point is authorized to a specific person, otherwise eMule will not recognize the point of the other party. Points are rewarded to those uploaded nodes, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 仇钧李斓蔡伟梁琳李建华
Owner SHANGHAI JIAO TONG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More