Detecting and Defending against Malicious Attacks in the iTrust ...
Detecting and Defending against Malicious Attacks in the iTrust ...
Detecting and Defending against Malicious Attacks in the iTrust ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Related Work<br />
Several recent publication, search, <strong>and</strong> retrieval systems<br />
are concerned with malicious attacks<br />
Morselli – uses a feedback mechanism to determ<strong>in</strong>e if<br />
an object is replicated sufficiently<br />
Jesi – uses gossip <strong>and</strong> blacklist mechanisms to identify<br />
malicious nodes, <strong>and</strong> focuses on hub attacks<br />
Condie – uses local trust scores to f<strong>in</strong>d malicious peers<br />
that upload corrupt, <strong>in</strong>au<strong>the</strong>ntic or misnamed content,<br />
<strong>and</strong> moves <strong>the</strong>m to <strong>the</strong> edge of <strong>the</strong> network<br />
ICOIN 2012 <strong>iTrust</strong> Yung-T<strong>in</strong>g Chuang