Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme

Authors

  • Lin Cai Networking Research Laboratory, ECE Department, New Jersey Institute of Technology, University Heights, Newark, NJ 07102, USA
  • Roberto Rojas-Cessa Networking Research Laboratory, ECE Department, New Jersey Institute of Technology, University Heights, Newark, NJ 07102, USA

DOI:

https://doi.org/10.13052/jcsm2245-1439.111

Keywords:

malware, peer-to-peer networks, P2P, trust management, virus proliferation

Abstract

Peer-to-peer (P2P) networking enables users with similar interests to exchange, contribute, or obtain files. This network model has been proven popular to exchange music, pictures, or software applications. These files are saved, and most likely executed, at the downloading host. At the expense of this mechanism, worms, viruses, and malware find an open front door to the downloading host and gives them a convenient environment for successful proliferation throughout the network. Although virus detection software is currently available, this countermeasure works in a reactive fashion, and in most times, in an isolated manner. In this paper, we consider a trust management scheme to contain the proliferation of viruses in P2P networks. Specifically, we propose a cooperative and distributed trust management scheme based on a two-layer approach to bound the proliferation of viruses. The new scheme is called double-layer dynamic trust (DDT) management scheme. Our results show that the proposed scheme bounds the proliferation of malware. With the proposed scheme, the number of infected hosts and the proliferation rate are limited to small values. In addition, we show that network activity is not discouraged by using the proposed scheme.

Downloads

Download data is not yet available.

Author Biographies

Lin Cai, Networking Research Laboratory, ECE Department, New Jersey Institute of Technology, University Heights, Newark, NJ 07102, USA

Lin Cai received the B.S. degree in telecommunication engineering from Nanjing University of Posts and Telecommunications, Nanjing, China. She received the M.S. degree in electrical engineering from Beijing University of Posts and Telecommunications, Beijing, China. She received Ph.D. degrees in electrical engineering from the New Jersey Institute of Technology, Newark, NJ. She is the recipient of the Hashimoto Fellowship for her Ph.D. dissertation from the New Jersey Institute of Technology. Her research interests include security, privacy and trust in Distributed networks (P2P networks).

Roberto Rojas-Cessa, Networking Research Laboratory, ECE Department, New Jersey Institute of Technology, University Heights, Newark, NJ 07102, USA

Roberto Rojas-Cessa received the Ph.D. degree in electrical engineering from Polytechnic Institute of New York University, Brooklyn, NY. Currently, he is an Associate Professor in the Department of Electrical and Computer Engineering, New Jersey Institute of Technology. He has been involved in the design and implementation of application-specific integratedcircuits (ASIC) for biomedical applications and highspeed computer communications, and in the development of high-performance scalable packet switches and reliable switches. Hewas part of the team designing a 40 Tb/s core router for Coree, Inc, in Tinton Falls, NJ. His research interests include high-speed switching and routing, fault tolerance, qualityof- service networks, network measurements, and distributed systems. His research has been funded by the U.S. National Science Foundation and private companies. He has served on several technical committees for IEEE conferences and as a reviewer and panelist for the U.S. National Science Foundation and the U.S. Department of Energy. He was a Visiting Professor at Thammasat University, Rangsit, Thailand. He is a senior member of IEEE and a member of ACM.

References

X. Xu, Y. Wang, S.P. Panwar, and K.W. Ross. A peer-to-peer video-on-demand system using multiple description coding and server diversity. Proc. IEEE International Conference on Image Processing (ICIP), pp. 1759–1762, October 2004.

X. Hei, C. Liang, J. Liang, Y. Liu, and K.W. Ross. A measurement study of a large-scale P2P IPTV system. IEEE Transactions on Multimedia, 9(8): December, 2007.

M. Macedonian. Distributed file sharing: Barbarians at the gate? IEEE Computer, 33(8): 99–101, August 2000.

Y.Wang, X.Yun, andY. Li. Analyzing the characteristics of gnutella overlays. Proc. IEEE IV International Conference in Information Technology, pp. 1095–1100, April, 2007.

J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis and defences. IPSN, Proceedings of the 3rd international symposium on Information processing in sensor networks, pp. 259–268, April, 2004.

L.-C. Chen and K.M. Carley. The impact of countermeasure propagation on the prevalence of computer viruses. IEEE Trans. on System, Man, and Cibernetics, 34(2): 823–833, April 2004.

E. Damiani, D.C. Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation based approach for choosing reliable resources in peer-to-peer networks. Proc. of the 9th ACM Conference on Computer and Communications Security (CCS), Washington, DC, pp. 207–216, November 2002.

S. Marti and H. Garcia-Molina. Limited reputation sharing in P2P systems. Proc. of the 5th ACM Conference on Electronic Commerce, New York, NY, pp. 91–101, May 2004.

J. Shin, T. Kim, Taehoon, and S. Tak. A reputation management scheme improving the trustworthiness of P2P networks. Proc. IEEE International Conference on Convergence and Hybrid Information Technology, pp. 92–97, August, 2008.

X. Dong, W. Yu, and Y. Pan. A dynamic trust management scheme to mitigate malware proliferation in P2P network. Proc. IEEE International Conference on Communications 2008, Beijing, China, pp. 1605–1609, May 2008.

E.K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim. A survey and comparison of peer-to-peer overlay network schemes. IEEE Comm. Survey and Tutorial, 7(2): 72–93, March, 2005.

P. Dhungel, X. Hei, K.W. Ross, and N. Saxena. The pollution attack in P2P live video streaming: Measurement results and defenses. Proc. Sigcomm P2P-TV Workshop, pp. 323–328, August 2007.

A. Cheng and E. Friedman. Sybilproof reputation mechanisms. Proceedings of the ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, pp. 128–132, November, 2005.

P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of eBay’s reputation system. Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce, pp. 127–157, November 2002.

L. Xiong and L. Liu. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, pp. 843–857, July 2004.

P. Herrmann. Trust-based procurement support for software components. Proc. 4th International Conference of Electronic Commerce Research, pp. 505–514, November, 2001.

K. Walsh and E.G. Sirer. Fighting peer-to-peer SPAM and decoys with object reputation. Proc. Third Workshop on the Economics of Peer-to-Peer Systems (P2PECON), pp. 138–143, Auguest, 2005.

G. Theodorakopoulos and J.S. Baras. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, pp. 318–328, February, 2006.

K. Hwang, M. Cai, Y.K. Kwok, S. Song, and Y. Chen. DHT-based security infrastructure for trusted internet and grid computing. International Journal of Critical Infrastructures, pp. 654–662, December, 2006.

S. Song, K. Hwang, and Y.K. Kwok. Trusted grid computing with security binding and trust integration. Journal of Grid Computing, pp. 53-73, June, 2005.

S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. Proc. 12th InternationalWorldWideWeb Conference, pp. 785–791, November, 2003.

X. Zhang and H.H. Chen. Analysis of virus and antivirus spreading dynamics. Proc. IEEE Global Communications Conference, pp. 871–875, November, 2005.

P. Li, Z.Wang, and X. Tan. Characteristic analysis of virus spreading in ad hoc networks. Proc. IEEE Workshop in Computational Intelligence and Security, pp. 538–541, March, 2008.

R. Kumar, D.D. Yao, A. Bagchi, K.W. Ross, and D. Rubenstein. Fluid modeling of pollution proliferation in P2P networks. Performance Evaluation Review, pp. 335–346, June, 2006.

B.F. Cooper and H. Garcia-Molina. Peer to peer data trading to preserve information. ACM TOIS, pp. 133–170, April 2002.

B. Horne, B. Pinkas, and T. Sander. Escrow services and incentives in peer-to-peer networks. Proc. 3rd ACM Conference on Electronic Commerce, pp. 85–94, October, 2001.

B. Yang and H. Garcia-Molina. Ppay: Micropayments for peer-to-peer systems. Proc. 10th ACM Conference on Computer and Communications Security (CCS), pp. 300–310, October, 2003.

L. Mekouar, Y. Iraqi, and R. Boutaba. Peer-to-Peer’s most wanted: Malicious peers. In International Computer Networks Journal, Special Issue on management in Peer-to-Peer Systems: Trust, Reputation and Security, 50(4):545–562, March, 2006.

O. Kwon, S. Lee and J. Kim. FileTrust: Reputation management for reliable resource sharing in structured peer-to-peer networks. IEICE Transactions Communication, pp. 826–835, April 2007.

C. Xie, G. Chen, and A. Vandenberg. Analysis of hybrid P2P overlay network topology. Computer Communications, 31(2):190–200, February 2008.

Downloads

Published

2012-01-10

How to Cite

1.
Cai L, Rojas-Cessa R. Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme. JCSANDM [Internet]. 2012 Jan. 10 [cited 2024 Apr. 25];1(1):1-20. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6061

Issue

Section

Articles

Most read articles by the same author(s)