Detecting and defending against malicious attacks in the iTrust information retrieval network

Yung-Ting Chuang*, Isai Michel Lombera, P. M. Melliar-Smith, L. E. Moser

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

This paper presents novel statistical algorithms for detecting and defending against malicious attacks in the iTrust information retrieval network. The novel detection algorithm determines empirically the probabilities of the exact numbers of matches based on the number of responses that the requesting node receives. It calculates analytically the probabilities of the exact numbers of matches and the probabilities of one or more matches when some proportion of the nodes have been subverted or are non-operational. It compares the empirical and analytical probabilities to estimate the proportion of subverted or non-operational nodes. The novel defensive adaptation algorithm then increases the number of nodes to which the metadata and the requests are distributed to maintain the same probability of a match when some of the nodes are subverted or non-operational as when all of the nodes are operational. Experimental results substantiate the effectiveness of the statistical algorithms for detecting and defending against malicious attacks.

Original languageEnglish
Title of host publicationInternational Conference on Information Networking 2012, ICOIN 2012 - Conference Program
Pages263-268
Number of pages6
DOIs
StatePublished - 2012
Event26th International Conference on Information Networking 2012, ICOIN 2012 - Bali, Indonesia
Duration: 1 Feb 20123 Feb 2012

Publication series

NameInternational Conference on Information Networking
ISSN (Print)1976-7684

Conference

Conference26th International Conference on Information Networking 2012, ICOIN 2012
Country/TerritoryIndonesia
CityBali
Period1/02/123/02/12

Keywords

  • Decentralized distributed information retrieval
  • Detecting defending malicious attacks
  • ITrust

Fingerprint

Dive into the research topics of 'Detecting and defending against malicious attacks in the iTrust information retrieval network'. Together they form a unique fingerprint.

Cite this