06.06.2013 Views

Detecting and Defending against Malicious Attacks in the iTrust ...

Detecting and Defending against Malicious Attacks in the iTrust ...

Detecting and Defending against Malicious Attacks in the iTrust ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Detect<strong>in</strong>g</strong> <strong>Malicious</strong> <strong>Attacks</strong><br />

Algorithm: Each request<strong>in</strong>g node<br />

Makes requests <strong>and</strong> collect number of responses<br />

Constructs empirical probabilities of number of matches<br />

Computes analytical probabilities of number of matches<br />

Uses Pearson’s chi-squared goodness-of-fit test:<br />

Determ<strong>in</strong>es x’ from smallest obta<strong>in</strong>ed <strong>in</strong> Pearson’s test<br />

ICOIN 2012 <strong>iTrust</strong> Yung-T<strong>in</strong>g Chuang

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!