×

Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems. (English) Zbl 1311.68060

Summary: Today trust is a key factor in distributed and collaborative environments aimed to model participating entities’ behavior, and to foresee their further actions. Yet, prior to the first interaction of a newcomer in the system trust and reputation models face a great challenge: how to assign an accurate initial reputation to a newcomer? The answer needs to tackle two well-known problems: cold-start and reputation bootstrapping. Cold-start is a common issue to any system when newcomers boot for the first time, while reputation bootstrapping especially affects highly distributed scenarios, where mobile entities travel across domains and collaborate with a number of them. In this paper we focus on the two problems, which are addressed through a novel reputation bootstrapping mechanism for newcomers in a collaborative alert system aimed at detecting distributed threats. Experiments confirm the accuracy of our proposal as well as its robustness in the presence of ill-intentioned entities.

MSC:

68P25 Data encryption (aspects in computer science)
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Zhou, C. V.; Leckie, C.; Karunasekera, S., A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, 29, 1, 124-140 (2010)
[3] Gunawan, L. A.; Vogel, M.; Kraemer, F. A.; Schmerl, S.; Slåtten, V.; Herrmann, P.; König, H., Modeling a distributed intrusion detection system using collaborative building blocks, ACM SIGSOFT Software Engineering Notes, 36, 1, 1-8 (2011)
[4] Dewri, R.; Ray, I.; Poolsappasit, N.; Whitley, D., Optimal security hardening on attack tree models of networks: A cost-benefit analysis, International Journal of Information Security, 11, 3, 167-188 (2012)
[5] Bykovyy, P.; Kochan, V.; Sachenko, A.; Aksoy, S.; Markowsky, G., Security network interface for alarm systems, Computer Standards & Interfaces, 34, 6, 468-475 (2012)
[6] Marti, S., Trust and reputation in peer-to-peer networks (May 2005), Stanford University, USA, PhD thesis
[7] Fan, X.; Li, M.; Ma, J.; Ren, Y.; Zhao, H.; Su, Z., Behavior-based reputation management in P2P file-sharing networks, Journal of Computer and System Sciences, 78, 6, 1737-1750 (2012) · Zbl 1250.68063
[8] Liu, X.; Datta, A., Contextual trust aided enhancement of data availability in peer-to-peer backup storage systems, Journal of Network and Systems Management, 20, 2, 200-225 (2012)
[9] Arazy, O.; Kumar, N.; Shapira, B., Improving social recommender systems, IT Professional, 11, 4, 38-44 (2009)
[10] Skopik, F.; Schall, D.; Dustdar, S., Start trusting strangers? Bootstrapping and prediction of trust, (Proceedings of the 10th International Conference on Web Information Systems Engineering. Proceedings of the 10th International Conference on Web Information Systems Engineering, Lecture Notes in Computer Science, vol. 5802 (2009)), 275-289
[11] Malik, Z.; Bouguettaya, A., Reputation bootstrapping for trust establishment among web services, IEEE Internet Computing, 13, 1, 40-47 (2009)
[12] Burnett, C.; Norman, T. J.; Sycara, K., Bootstrapping trust evaluations through stereotypes, (Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (2010)), 241-248
[13] Durresi, A.; Durresi, M.; Barolli, L., Network trust management in emergency situations, Journal of Computer and System Sciences, 77, 4, 677-686 (2011)
[14] Dimitriou, T.; Karame, G.; Christou, I., SuperTrust - A secure and efficient framework for handling trust in super peer networks, (Proceedings of the 9th International Conference on Distributed Computing and Networking. Proceedings of the 9th International Conference on Distributed Computing and Networking, Lecture Notes in Computer Science, vol. 4904 (2008)), 350-362 · Zbl 1131.68314
[15] Martínez Pérez, G.; García Clemente, F. J.; Gil Pérez, M.; Gómez Skarmeta, A. F., Secure overlay networks for federated service provision and management, Computers & Electrical Engineering, 34, 3, 173-191 (2008)
[16] Fung, C.; Zhang, J.; Aib, I.; Boutaba, R., Trust management and admission control for host-based collaborative intrusion detection, Journal of Network and Systems Management, 19, 2, 257-277 (2011)
[17] Gil Pérez, M.; Gómez Mármol, F.; Martínez Pérez, G.; Skarmeta Gómez, A. F., RepCIDN: A reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms, Journal of Network and Systems Management, 21, 1, 128-167 (2013)
[18] Catania, C. A.; García Garino, C., Automatic network intrusion detection: Current techniques and open issues, Computers & Electrical Engineering, 38, 5, 1062-1072 (2012)
[19] Ortega, F. J.; Troyano, J. A.; Cruz, F. L.; Vallejo, C. G.; Enríquez, F., Propagation of trust and distrust for the detection of trolls in a social network, Computer Networks, 56, 12, 2884-2895 (2012)
[20] Squicciarini, A. C.; Paci, F.; Bertino, E., Trust establishment in the formation of virtual organizations, Computer Standards & Interfaces, 33, 1, 13-23 (2011)
[21] Golbeck, J. A., Computing and applying trust in web-based social networks (April 2005), University of Maryland, USA, PhD thesis
[22] Lesani, M.; Montazeri, N., Fuzzy trust aggregation and personalized trust inference in virtual social networks, Computational Intelligence, 25, 2, 51-83 (2009)
[23] Gil Pérez, M.; Gómez Mármol, F.; Martínez Pérez, G.; Gómez Skarmeta, A. F., Mobility in collaborative alert systems: Building trust through reputation, (Workshop on Wireless Cooperative Network Security. Workshop on Wireless Cooperative Network Security, Lecture Notes in Computer Science, vol. 6827 (2011)), 251-262
[25] Douceur, J. R., The Sybil attack, (Peer-to-Peer Systems. Peer-to-Peer Systems, Lecture Notes in Computer Science, vol. 2429 (2002)), 251-260 · Zbl 1014.68882
[26] da Costa Cordeiro, W. L.; Roberto Santos, F.; Huff Mauch, G.; Pilla Barcelos, M.; Paschoal, L., Gaspary, Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks, Computer Networks, 56, 11, 2569-2589 (2012)
[27] López Millán, G.; Gil Pérez, M.; Martínez Pérez, G.; Gómez Skarmeta, A. F., PKI-based trust management in inter-domain scenarios, Computers & Security, 29, 2, 278-290 (2010)
[28] Tuecke, S.; Welch, V.; Engert, D.; Pearlman, L.; Thompson, M., Internet X.509 public key infrastructure (PKI) proxy certificate profile, IETF RFC, 3820 (June 2004)
[29] Nenadic, A.; Zhang, N.; Yao, L.; Morrow, T., Levels of authentication assurance: An investigation, (Proceedings of the 3rd International Symposium on Information Assurance and Security (2007)), 155-160
[30] Palanisamy, V.; Annadurai, P., Trust-based clustering for multicast key distribution scheme in ad hoc network (TBCMKDS), International Journal of Internet Protocol Technology, 6, 1-2, 46-64 (2011)
[31] Chen, Q.; Fadlullah, Z. M.; Lin, X.; Kato, N., A clique-based secure admission control scheme for mobile ad hoc networks (MANETs), Journal of Network and Computer Applications, 34, 6, 1827-1835 (2011)
[33] Burr, W. E.; Dodson, D. F.; Newton, E. M.; Perlner, R. A.; Polk, W. T.; Gupta, S.; Nabbus, E. A., Electronic Authentication Guideline (December 2011), National Institute of Standards and Technology (NIST), Special Publication 800-63-1
[35] Michalas, A.; Dimitriou, T.; Giannetsos, T.; Komninos, N.; Prasad, N. R., Vulnerabilities of decentralized additive reputation systems regarding the privacy of individual votes, Wireless Personal Communications, 66, 3, 559-575 (2012)
[36] Ismail, R.; Boyd, C.; Josang, A.; Russell, S., An efficient off-line reputation scheme using articulated certificates, (Proceedings of the 2nd International Workshop on Security In Information Systems (2004)), 53-62
[37] Huynh, T. D.; Jennings, N. R.; Shadbolt, N. R., Certified reputation: How an agent can trust a stranger, (Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (2006)), 1217-1224
[38] Fang, H.; Zhang, J.; Sensoy, M.; Thalmann, N. M., A generalized stereotypical trust model, (Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (2012)), 698-705
[39] Venanzi, M.; Piunti, M.; Falcone, R.; Castelfranchi, C., Reasoning with categories for trusting strangers: A cognitive architecture, (Proceedings of the 14th International Workshop on Trust in Agent Societies (2011)), 109-124
[40] Ahamed, S. I.; Hoque, E.; Rahman, F.; Zulkernine, M., Towards secure trust bootstrapping in pervasive computing environment, (Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium (2008)), 89-96
[41] Kamvar, S. D.; Schlosser, M. T.; Garcia-Molina, H., The EigenTrust algorithm for reputation management in P2P networks, (Proceedings of the 12th International Conference on World Wide Web (2003)), 640-651
[42] Wang, X.; Govindan, K.; Mohapatra, P., Provenance-based information trustworthiness evaluation in multi-hop networks, (Proceedings of the 2010 IEEE Global Telecommunications Conference (2010)), 1-5
[43] Xiong, L.; Liu PeerTrust, L., Supporting reputation-based trust for peer-to-peer electronic communities, IEEE Transactions on Knowledge and Data Engineering, 16, 7, 843-857 (2004)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.