2008 IEEE International Conference on Communications 2008
DOI: 10.1109/icc.2008.310
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(17 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…Ding et al have proposed a model based on trust management scheme that can mitigate the malware proliferation in P2P content distribution systems [Ding et al, 2008]. Zhou et al in [Zhou et al, 2005] investigated the worms taking advantage of P2P weakness and proposed several countermeasures based on individual P2P users to carry out detection and post-detection mitigation.…”
Section: Trust Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Ding et al have proposed a model based on trust management scheme that can mitigate the malware proliferation in P2P content distribution systems [Ding et al, 2008]. Zhou et al in [Zhou et al, 2005] investigated the worms taking advantage of P2P weakness and proposed several countermeasures based on individual P2P users to carry out detection and post-detection mitigation.…”
Section: Trust Managementmentioning
confidence: 99%
“…Consequently, each user in the system needs to evaluate the information received from another user in order to determine the trustworthiness about the information as well as the provider. This can be achieved by employing trust management techniques [Ding et al, 2008] within these systems. However, most trust models in P2P systems are identity-based; hence there exists a trade-off between trust and anonymity.…”
Section: Anonymity Issues In P2pmentioning
confidence: 99%
“…In this twolayer approach, each peer has a trust table that keeps two trust values. The first parameter, similar to the one used in DTM [11], is a trust value corresponding to the other peers. A trust value at peer A about peer B means the probability A has that a contaminated file would be downloaded from B.…”
Section: Introductionmentioning
confidence: 99%
“…In [11], a dynamic trust management scheme is proposed. This scheme is based on localized trust evaluation and in alert dissemination to prevent others from downloading a file from a suspicious peer.…”
Section: Introductionmentioning
confidence: 99%
“…A dynamic trust management scheme based on localized trust evaluation and on a warning dissemination to prevent others from downloading a file from a suspicious peer was proposed [11]. The scheme aims to limit the proliferation of viruses using trust values on peers.…”
Section: Introductionmentioning
confidence: 99%