Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme
DOI:
https://doi.org/10.13052/jcsm2245-1439.111Keywords:
malware, peer-to-peer networks, P2P, trust management, virus proliferationAbstract
Peer-to-peer (P2P) networking enables users with similar interests to exchange, contribute, or obtain files. This network model has been proven popular to exchange music, pictures, or software applications. These files are saved, and most likely executed, at the downloading host. At the expense of this mechanism, worms, viruses, and malware find an open front door to the downloading host and gives them a convenient environment for successful proliferation throughout the network. Although virus detection software is currently available, this countermeasure works in a reactive fashion, and in most times, in an isolated manner. In this paper, we consider a trust management scheme to contain the proliferation of viruses in P2P networks. Specifically, we propose a cooperative and distributed trust management scheme based on a two-layer approach to bound the proliferation of viruses. The new scheme is called double-layer dynamic trust (DDT) management scheme. Our results show that the proposed scheme bounds the proliferation of malware. With the proposed scheme, the number of infected hosts and the proliferation rate are limited to small values. In addition, we show that network activity is not discouraged by using the proposed scheme.
Downloads
References
X. Xu, Y. Wang, S.P. Panwar, and K.W. Ross. A peer-to-peer video-on-demand system using multiple description coding and server diversity. Proc. IEEE International Conference on Image Processing (ICIP), pp. 1759–1762, October 2004.
X. Hei, C. Liang, J. Liang, Y. Liu, and K.W. Ross. A measurement study of a large-scale P2P IPTV system. IEEE Transactions on Multimedia, 9(8): December, 2007.
M. Macedonian. Distributed file sharing: Barbarians at the gate? IEEE Computer, 33(8): 99–101, August 2000.
Y.Wang, X.Yun, andY. Li. Analyzing the characteristics of gnutella overlays. Proc. IEEE IV International Conference in Information Technology, pp. 1095–1100, April, 2007.
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: Analysis and defences. IPSN, Proceedings of the 3rd international symposium on Information processing in sensor networks, pp. 259–268, April, 2004.
L.-C. Chen and K.M. Carley. The impact of countermeasure propagation on the prevalence of computer viruses. IEEE Trans. on System, Man, and Cibernetics, 34(2): 823–833, April 2004.
E. Damiani, D.C. Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation based approach for choosing reliable resources in peer-to-peer networks. Proc. of the 9th ACM Conference on Computer and Communications Security (CCS), Washington, DC, pp. 207–216, November 2002.
S. Marti and H. Garcia-Molina. Limited reputation sharing in P2P systems. Proc. of the 5th ACM Conference on Electronic Commerce, New York, NY, pp. 91–101, May 2004.
J. Shin, T. Kim, Taehoon, and S. Tak. A reputation management scheme improving the trustworthiness of P2P networks. Proc. IEEE International Conference on Convergence and Hybrid Information Technology, pp. 92–97, August, 2008.
X. Dong, W. Yu, and Y. Pan. A dynamic trust management scheme to mitigate malware proliferation in P2P network. Proc. IEEE International Conference on Communications 2008, Beijing, China, pp. 1605–1609, May 2008.
E.K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim. A survey and comparison of peer-to-peer overlay network schemes. IEEE Comm. Survey and Tutorial, 7(2): 72–93, March, 2005.
P. Dhungel, X. Hei, K.W. Ross, and N. Saxena. The pollution attack in P2P live video streaming: Measurement results and defenses. Proc. Sigcomm P2P-TV Workshop, pp. 323–328, August 2007.
A. Cheng and E. Friedman. Sybilproof reputation mechanisms. Proceedings of the ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems, pp. 128–132, November, 2005.
P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of eBay’s reputation system. Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce, pp. 127–157, November 2002.
L. Xiong and L. Liu. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, pp. 843–857, July 2004.
P. Herrmann. Trust-based procurement support for software components. Proc. 4th International Conference of Electronic Commerce Research, pp. 505–514, November, 2001.
K. Walsh and E.G. Sirer. Fighting peer-to-peer SPAM and decoys with object reputation. Proc. Third Workshop on the Economics of Peer-to-Peer Systems (P2PECON), pp. 138–143, Auguest, 2005.
G. Theodorakopoulos and J.S. Baras. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, pp. 318–328, February, 2006.
K. Hwang, M. Cai, Y.K. Kwok, S. Song, and Y. Chen. DHT-based security infrastructure for trusted internet and grid computing. International Journal of Critical Infrastructures, pp. 654–662, December, 2006.
S. Song, K. Hwang, and Y.K. Kwok. Trusted grid computing with security binding and trust integration. Journal of Grid Computing, pp. 53-73, June, 2005.
S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. Proc. 12th InternationalWorldWideWeb Conference, pp. 785–791, November, 2003.
X. Zhang and H.H. Chen. Analysis of virus and antivirus spreading dynamics. Proc. IEEE Global Communications Conference, pp. 871–875, November, 2005.
P. Li, Z.Wang, and X. Tan. Characteristic analysis of virus spreading in ad hoc networks. Proc. IEEE Workshop in Computational Intelligence and Security, pp. 538–541, March, 2008.
R. Kumar, D.D. Yao, A. Bagchi, K.W. Ross, and D. Rubenstein. Fluid modeling of pollution proliferation in P2P networks. Performance Evaluation Review, pp. 335–346, June, 2006.
B.F. Cooper and H. Garcia-Molina. Peer to peer data trading to preserve information. ACM TOIS, pp. 133–170, April 2002.
B. Horne, B. Pinkas, and T. Sander. Escrow services and incentives in peer-to-peer networks. Proc. 3rd ACM Conference on Electronic Commerce, pp. 85–94, October, 2001.
B. Yang and H. Garcia-Molina. Ppay: Micropayments for peer-to-peer systems. Proc. 10th ACM Conference on Computer and Communications Security (CCS), pp. 300–310, October, 2003.
L. Mekouar, Y. Iraqi, and R. Boutaba. Peer-to-Peer’s most wanted: Malicious peers. In International Computer Networks Journal, Special Issue on management in Peer-to-Peer Systems: Trust, Reputation and Security, 50(4):545–562, March, 2006.
O. Kwon, S. Lee and J. Kim. FileTrust: Reputation management for reliable resource sharing in structured peer-to-peer networks. IEICE Transactions Communication, pp. 826–835, April 2007.
C. Xie, G. Chen, and A. Vandenberg. Analysis of hybrid P2P overlay network topology. Computer Communications, 31(2):190–200, February 2008.