• DocumentCode
    3312932
  • Title

    User cooperation trust model and its application in network security management

  • Author

    Liu Wu ; Ren Ping ; Liu Ke ; Duan Hai-xin

  • Author_Institution
    Network Res. Center, Tsinghua Univ., Beijing, China
  • Volume
    4
  • fYear
    2011
  • fDate
    26-28 July 2011
  • Firstpage
    2335
  • Lastpage
    2339
  • Abstract
    In traditional network security management systems, system administrators could not prevent malicious users from illegal actions in time. In this paper, we first present a User Cooperation Trust Model (UCTM) which not only encourages the good behavior liberally, but also punishes those minatory behaviors decisively. Then based on UCTM we proposed and implemented the trust based P2P Network Security Management System (T2SMS) which dynamically evaluate user´s reputation correlated with the user´s privilege in the network. With T2SMS, a malicious user will be kicked out from the network system and refused from accessing resources of the network automatically when the user´s reputation is lower than some threshold.
  • Keywords
    computer crime; computer network management; computer network security; peer-to-peer computing; illegal action; malicious user; minatory behavior; system administrator; trust based P2P network security management system; user cooperation trust model; user reputation; Authentication; Computational modeling; Conferences; History; Peer to peer computing; Servers; Computer Network; Security Management; Trust; User Behavior;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Fuzzy Systems and Knowledge Discovery (FSKD), 2011 Eighth International Conference on
  • Conference_Location
    Shanghai
  • Print_ISBN
    978-1-61284-180-9
  • Type

    conf

  • DOI
    10.1109/FSKD.2011.6019988
  • Filename
    6019988