DocumentCode
3312932
Title
User cooperation trust model and its application in network security management
Author
Liu Wu ; Ren Ping ; Liu Ke ; Duan Hai-xin
Author_Institution
Network Res. Center, Tsinghua Univ., Beijing, China
Volume
4
fYear
2011
fDate
26-28 July 2011
Firstpage
2335
Lastpage
2339
Abstract
In traditional network security management systems, system administrators could not prevent malicious users from illegal actions in time. In this paper, we first present a User Cooperation Trust Model (UCTM) which not only encourages the good behavior liberally, but also punishes those minatory behaviors decisively. Then based on UCTM we proposed and implemented the trust based P2P Network Security Management System (T2SMS) which dynamically evaluate user´s reputation correlated with the user´s privilege in the network. With T2SMS, a malicious user will be kicked out from the network system and refused from accessing resources of the network automatically when the user´s reputation is lower than some threshold.
Keywords
computer crime; computer network management; computer network security; peer-to-peer computing; illegal action; malicious user; minatory behavior; system administrator; trust based P2P network security management system; user cooperation trust model; user reputation; Authentication; Computational modeling; Conferences; History; Peer to peer computing; Servers; Computer Network; Security Management; Trust; User Behavior;
fLanguage
English
Publisher
ieee
Conference_Titel
Fuzzy Systems and Knowledge Discovery (FSKD), 2011 Eighth International Conference on
Conference_Location
Shanghai
Print_ISBN
978-1-61284-180-9
Type
conf
DOI
10.1109/FSKD.2011.6019988
Filename
6019988
Link To Document