Privacy-preserving trust management for unwanted traffic control

2017 ◽  
Vol 72 ◽  
pp. 305-318 ◽  
Author(s):  
Lifang Zhang ◽  
Zheng Yan ◽  
Raimo Kantola

2013 ◽  
Vol 20 (1) ◽  
pp. 25-51 ◽  
Author(s):  
Zheng Yan ◽  
Raimo Kantola ◽  
Yue Shen


The Internet has become the backbone of remote communications, networking, and computing. It offers an incentive platform for many services and applications. People’s lives have been dramatically changed by the fast growth of the Internet. However, it also provides an easy channel for distributing contents that are unwanted by users. Unwanted traffic includes malware, viruses, spam, intrusions, unsolicited commercial advertisements, or unexpected contents. This chapter discusses applying trust management technology to automatically conduct unwanted traffic control in the Internet, especially the mobile Internet. The authors propose a generic unwanted traffic control solution through trust management. It can control unwanted traffic from its source to destinations in a personalized manner according to trust evaluation at a Global Trust Operator and traffic and behavior analysis at hosts. Thus, it can support unwanted traffic control in both a distributed and centralized manner and in both a defensive and offensive way. Simulation-based evaluation shows that the solution is effective with regard to accuracy and efficiency for Botnet intrusion and DDoS intrusion via reflectors. It is also robust against a number of malicious system attacks, such as hide evidence attack, bad mouthing attack, on-off attack, malicious attack of ISP, and combinations, which are playing in conjunction with various traffic intrusions. Meanwhile, the solution can provide personalized unwanted traffic control based on unwanted traffic detection behaviors. A prototype system is implemented to illustrate its applicability for SMS spam control.







Self-organized networks based on mobile devices (e.g., Mobile Ad Hoc Networks [MANET]) are becoming a practical platform for pervasive social networking. People, either familiar or strangers, communicate with each other via such a network for instant social activities. How to help mobile users to build up trust in pervasive social networking is becoming an important and interesting issue. Trust concerns not only security, but also privacy, as well as quality of social networking experiences. It relates to many properties that are essential for establishing a trust relationship in ephemeral and dynamically changed pervasive social environments. This chapter reviews the literature with regard to how to build up trust in pervasive social networking. The authors explore whether pervasive social networking is demanded, considering many existing popular Internet social networking services. Based on a need assessment survey, they propose a trust management framework that supports context-aware trust/reputation generation, trustworthy content recommendations, secure communications, unwanted traffic control, user privacy recommendations, and secure face-to-face pervasive social communications. Simulations, prototype implementation, and user experiments further prove the effectiveness of the proposed solutions.



Author(s):  
Bohan Li ◽  
Ruochen Liang ◽  
Di Zhu ◽  
Weitong Chen ◽  
Qinyong Lin


Sign in / Sign up

Export Citation Format

Share Document