TY - GEN
T1 - Detecting and defending against malicious attacks in the iTrust information retrieval network
AU - Chuang, Yung-Ting
AU - Lombera, Isai Michel
AU - Melliar-Smith, P. M.
AU - Moser, L. E.
PY - 2012
Y1 - 2012
N2 - This paper presents novel statistical algorithms for detecting and defending against malicious attacks in the iTrust information retrieval network. The novel detection algorithm determines empirically the probabilities of the exact numbers of matches based on the number of responses that the requesting node receives. It calculates analytically the probabilities of the exact numbers of matches and the probabilities of one or more matches when some proportion of the nodes have been subverted or are non-operational. It compares the empirical and analytical probabilities to estimate the proportion of subverted or non-operational nodes. The novel defensive adaptation algorithm then increases the number of nodes to which the metadata and the requests are distributed to maintain the same probability of a match when some of the nodes are subverted or non-operational as when all of the nodes are operational. Experimental results substantiate the effectiveness of the statistical algorithms for detecting and defending against malicious attacks.
AB - This paper presents novel statistical algorithms for detecting and defending against malicious attacks in the iTrust information retrieval network. The novel detection algorithm determines empirically the probabilities of the exact numbers of matches based on the number of responses that the requesting node receives. It calculates analytically the probabilities of the exact numbers of matches and the probabilities of one or more matches when some proportion of the nodes have been subverted or are non-operational. It compares the empirical and analytical probabilities to estimate the proportion of subverted or non-operational nodes. The novel defensive adaptation algorithm then increases the number of nodes to which the metadata and the requests are distributed to maintain the same probability of a match when some of the nodes are subverted or non-operational as when all of the nodes are operational. Experimental results substantiate the effectiveness of the statistical algorithms for detecting and defending against malicious attacks.
KW - Decentralized distributed information retrieval
KW - Detecting defending malicious attacks
KW - ITrust
UR - http://www.scopus.com/inward/record.url?scp=84860685744&partnerID=8YFLogxK
U2 - 10.1109/ICOIN.2012.6164389
DO - 10.1109/ICOIN.2012.6164389
M3 - Conference contribution
AN - SCOPUS:84860685744
SN - 9781467302517
T3 - International Conference on Information Networking
SP - 263
EP - 268
BT - International Conference on Information Networking 2012, ICOIN 2012 - Conference Program
T2 - 26th International Conference on Information Networking 2012, ICOIN 2012
Y2 - 1 February 2012 through 3 February 2012
ER -