GenTrust: A genetic trust management model for peer-to-peer systems☆
Graphical abstract
Introduction
Open nature of peer-to-peer (P2P) systems facilitates join or leave of users to the network without worrying about any obligations. However this freedom creates potential threats for good behaving peers. Since there is no central authority to manage inter-peer interactions, malicious peers can easily perform attacks or take advantage of system resources without contributing to the system. A way to mitigate such threats is to create artificial trust relationships among users based on peer interactions. Trust models can help in such open environments to quantify trustworthiness numerically and create trust relationships among peers. However, it is hard to measure and formulate trust with numeric values. Furthermore, measuring trust without a priori knowledge is a challenging problem in P2P systems since peers mostly interact with unknown peers. Therefore, trust management in P2P environments is a difficult research problem.
When there is a central authority, trust management is relatively easy problem. In some e-commerce applications, a central authority collects user inputs about completed interactions and this information is used to make trust decisions about future interactions. Although fake users and interactions can pollute the collected information, this model mostly works on e-commerce applications. However, P2P systems need more complex trust management models due to the lack of a central authority. Peers need to store and manage trust information about each other [1], [2], [3]. On the other hand, uncertain information collected from neighboring peers might be deceptive. Malicious peers might deliberately provide wrong information to the system and this might not be detected since there is no central authority. Therefore, trust models in P2P systems should be able to recognize various attacks and help benign peers to find trustworthy peers. While doing this task, ambiguous information collected from other peers should be processed carefully to make correct decisions.
The trust decision problem can be considered as a classification problem, and machine learning techniques could be employed to distinguish malicious peers from benign peers. This paper proposes a genetic programming (GP) based trust management model (GenTrust), extending our previous work [4] with greater experimental verification and analysis on features. The proposed model helps to identify malicious peers and find trustworthy peers using the features derived from peer interactions and recommendations. The model has evolved with these features by using genetic programming, which provides a mathematical function to measure trust values of peers. A peer ranks its neighbors according to trust values, and makes trusting decisions using these values. Each peer stores trust relationships for the peers they have interacted in the past. As peers gain more neighbors with time, malicious peers are excluded from the system using trust relationships. The evolved model is evaluated against various attackers, namely individual attackers, collaborators, and pseudospoofers. The results show that the model decreases the number of attacks considerably. Features of the model are also analyzed and their effects on the performance is assessed. Satisfaction related features are found more influential in trust decisions. Cross training and testing are performed among various attacker types to understand the model's adaptability on different attacker behaviors. These experiments show that the models trained on complex attack behaviors are also successful in simple attack behaviors.
Organization of the paper is as follows. Section 2 gives a summary of the state of the art research. Sections 3 and 4 explain the proposed trust model and the simulation environment respectively. Section 5 presents the experiments and discusses their results extensively. Section 6 outlines the conclusions of the study.
Section snippets
Related work
Trust is a social concept and hard to measure and formalize with theoretical foundations. Although some approaches have formulated trust as a result of direct experiences [5], most trust models use recommendations of others to build trust relationships [6], [7], [8]. However, it might be hard to correctly evaluate trustworthiness using recommendations, since recommendations may contain deceptive or subjective opinions [9]. To better address different aspects of the trust, some approaches use
The model
Measuring trust without a priori knowledge is a challenging problem in P2P systems since peers mostly interact with unknown peers. In this research, GP is proposed to discover automatically complex properties of P2P networks. GP is a common evolutionary computation technique introduced by Koza [59]. Evolutionary computation (EC) is one of the most promising approaches in intrusion detection. A recent survey [49] showed that evolutionary computation techniques allow to obtain more readable
The attacks
In this section, the attack models considered in the study are outlined. Defining representative and realistic attack model is very important to evaluate a trust model successfully. The attacks covered here range from simple attacks to hard attacks in terms of detection. Attacks taking advantage of evasion strategies such as collaboration and pseudospoofing are also taken into account in the model.
In a P2P network, benign peers always behave as expected and properly carry out their tasks such
Analysis on individual attackers
First of all, a trust model is generated for individual attackers. In the training, the generated individuals are simulated on a network in which 10% of the peers is malicious. The GP algorithm is run ten times for each attack type and the best results is evaluated in testing. Testing is done on networks with different amounts of malicious peers (10%, 30% and 50%). In the experiments, the attack probability of hypocritical attackers is set 20% for all interactions.
Table 3 shows the success
Conclusion
This paper proposes GenTrust, a trust model evolved using genetic programming. The generated model allows each peer to calculate trust values of other peers based on interaction and recommendation based features. Naive and hypocritical attacker models are studied with individual, collaborative, and pseudospoofing behaviors. The model is trained against these attack types and evaluated on various network setups containing different ratio of malicious peers. The experimental results show that the
References (65)
- et al.
Gradual trust and distrust in recommender systems
Fuzzy Sets Syst.
(2009) - et al.
A distributed reputation and trust management scheme for mobile peer-to-peer networks
Comput. Commun.
(2012) - et al.
A unified trust management strategy for content sharing in peer-to-peer networks
Appl. Math. Modell.
(2013) - et al.
The use of computational intelligence in intrusion detection systems: A review
Appl. Soft Comput.
(2010) - et al.
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
Comput. Netw.
(2011) - et al.
On the optimality of cooperative intrusion detection for resource constrained wireless networks
Comput. Secur.
(2013) - et al.
Managing trust in a peer-2-peer information system
- et al.
Choosing reputable servents in a p2p network
- et al.
The (eigentrust) algorithm for reputation management in P2P networks
- et al.
Evolving a trust model for peer-to-peer networks using genetic programming
Formalising trust as a computational concept
Supporting trust in virtual communities
A social mechanism of reputation management in electronic communities
A computational model of trust and reputation for e-businesses
Analysing topologies of transitive trust
Propagation of trust and distrust
Reflections on the dimensions of trust and trustworthiness among online consumers
SIGMIS Database
Decoupling service and feedback trust in a peer-to-peer reputation system.
Reputation systems
Commun. ACM
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
The sybil attack
Sybilguard: defending against sybil attacks via social networks
SIGCOMM Comput. Commun. Rev.
Sybil-resilient online content voting
The social cost of cheap pseudonyms
J. Econ. Manag. Strateg.
Trust-aware delivery of composite goods
Building trust and security in peer-to-peer systems
Reputation-based trust management in peer-to-peer systems: taxonomy and anatomy
A reputation-based trust management in peer-to-peer network systems
A reputation-based trust management system for p2p networks
Gossiptrust for fast reputation aggregation in peer-to-peer networks
IEEE Trans. Knowl. Data Eng.
Peertrust Supporting reputation-based trust for peer-to-peer ecommerce communities
IEEE Trans. Knowl. Data Eng.
Chord: A scalable peer-to-peer lookup service for internet applications
ACM SIGCOMM Comput. Commun. Rev.
Cited by (0)
- ☆
This paper is an extended, improved version of the paper “Evolving a Trust Model for Peer-To-Peer Networks Using Genetic Programming” presented at EvoComNet2014 and published in: Applications of Evolutionary Computing, Proceedings of 17th European Conference, EvoApplications 2014, Granada, Spain, April 23–25, 2014, LNCS 8602, Springer, 2014.