06.06.2013 Views

Detecting and Defending against Malicious Attacks in the iTrust ...

Detecting and Defending against Malicious Attacks in the iTrust ...

Detecting and Defending against Malicious Attacks in the iTrust ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Related Work<br />

Several recent publication, search, <strong>and</strong> retrieval systems<br />

are concerned with malicious attacks<br />

Morselli – uses a feedback mechanism to determ<strong>in</strong>e if<br />

an object is replicated sufficiently<br />

Jesi – uses gossip <strong>and</strong> blacklist mechanisms to identify<br />

malicious nodes, <strong>and</strong> focuses on hub attacks<br />

Condie – uses local trust scores to f<strong>in</strong>d malicious peers<br />

that upload corrupt, <strong>in</strong>au<strong>the</strong>ntic or misnamed content,<br />

<strong>and</strong> moves <strong>the</strong>m to <strong>the</strong> edge of <strong>the</strong> network<br />

ICOIN 2012 <strong>iTrust</strong> Yung-T<strong>in</strong>g Chuang

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!