A survey of attack and defense techniques for reputation systems
2009, ACM Computing Surveys
Abstract
Reputation systems provide mechanisms to produce a metric encapsulating reputation for a given domain for each identity within the system. These systems seek to generate an accurate assessment in the face of various factors including but not limited to unprecedented community size and potentially adversarial environments. We focus on attacks and defense mechanisms in reputation systems. We present an analysis framework that allows for general decomposition of existing reputation systems. We classify attacks against reputation systems by identifying which system components and design choices are the target of attacks. We survey defense mechanisms employed by existing reputation systems. Finally, we analyze several landmark systems in the peer-to-peer domain, characterizing their individual strengths and weaknesses. Our work contributes to understanding 1) which design components of reputation systems are most vulnerable, 2) what are the most appropriate defense mechanisms and 3) how these defense mechanisms can be integrated into existing or future reputation systems to make them resilient to attacks.
References (70)
- Aberer, K. and Despotovic, Z. 2001. Managing trust in a peer-2-peer information system. In CIKM '01: Proceedings of the tenth international conference on Information and knowledge management. ACM Press, New York, NY, USA, 310-317.
- Adar, E. and Huberman, B. 2000. Free riding on Gnutella. First Monday 5, 10, 2.
- Adler, B. and de Alfaro, L. 2007. A content-driven reputation system for the Wikipedia. In Proceedings of the 16th international conference on World Wide Web (WWW). ACM Press, New York, NY, USA, 261-270.
- Akerlof, G. 1970. The market for "lemons": Quality uncertainty and the market mechanism. The Quarterly Journal of Economics 84, 3, 488-500.
- Altman, A. and Tennenholtz, M. 2005a. On the axiomatic foundations of ranking systems. In Proc. 19th International Joint Conference on Artificial Intelligence. 917-922.
- Altman, A. and Tennenholtz, M. 2005b. Ranking systems: the PageRank axioms. In Proceed- ings of the 6th ACM conference on Electronic commerce. ACM Press New York, NY, USA, 1-8.
- Altman, A. and Tennenholtz, M. 2006. An axiomatic approach to personalized ranking systems. In Proceedings of the 20th International Joint Conference on Artificial Intelligence.
- Aringhieri, R., Damiani, E., Vimercati, S. D. C. D., Paraboschi, S., and Samarati, P. 2006. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. J. Am. Soc. Inf. Sci. Technol. 57, 4 (February), 528-537.
- Ba, S. and Pavlou, P. 2002. Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly 26, 3, 243-268.
- Bazzi, R. A. and Konjevod, G. 2005. On the establishment of distinct identities in overlay net- works. In PODC '05: Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing. ACM Press, New York, NY, USA, 312-320.
- Beth, T., Borcherding, M., and Klein, B. 1994. Valuation of trust in open networks. In Computer Security-Esorics 94: Third European Symposium on Research in Computer Security. Springer, Brighton, United Kingdom.
- Buchegger, S. and Le Boudec, J. Y. 2004. A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems.
- Castro, M., Druschel, P., Ganesh, A., Rowstron, A., and Wallach, D. S. 2002. Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36, SI, 299- 314.
- Cheng, A. and Friedman, E. 2005. Sybilproof reputation mechanisms. In Applications, Tech- nologies, Architectures, and Protocols for Computer Communication. ACM Press New York, NY, USA, 128-132.
- Cheng, A. and Friedman, E. 2006. Manipulability of PageRank under Sybil strategies. In First Workshop on the Economics of Networked Systems (NetEcon06).
- Cormen, T., Leiserson, C., Rivest, R., and Stein, C. 2001. Introduction to Algorithms. MIT Press.
- Dahan, S. and Sato, M. 2007. Survey of six myths and oversights about distributed hash tables' security. In Distributed Computing Systems Workshops. ICDCSW '07. 27th International Conference on. IEEE Computer Society, Washington, DC, USA.
- Damiani, E., De Capitani Di Vimercati, S., Paraboschi, S., and Samarati, P. 2003. Managing and sharing servants' reputations in p2p systems. IEEE Transactions on Knowledge and Data Engineering 15, 4 (July-Aug.), 840-854.
- Damiani, E., di Vimercati, D. C., Paraboschi, S., Samarati, P., and Violante, F. 2002. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security. ACM Press, New York, NY, USA, 207-216.
- Dellarocas, C. 2003. The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Management Science 49, 10 (October), 1407-1424.
- Dimitriou, T., Karame, G., and Christou, I. 2007. SuperTrust: A secure and efficient framework for handling trust in super peer networks. In Proceedings of ACM PODC 2007.
- Douceur, J. R. 2002. The Sybil attack. In Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS). Springer Berlin / Heidelberg, 251-260.
- Eugster, P., Handurukande, S., Guerraoui, R., Kermarrec, A.-M., and Kouznetsov, P. 2001. Lightweight probabilistic broadcast. In The International Conference on Dependable Systems and Networks (DSN 2001).
- Feldman, M., Lai, K., Stoica, I., and Chuang, J. 2004. Robust incentive techniques for peer-to- peer networks. In Proceedings of the 5th ACM conference on Electronic commerce. Proceedings of the 5th ACM conference on Electronic commerce 1, 1, 102-111.
- Flocchini, P., Nayak, A., and Xie, M. 2007. Enhancing peer-to-peer systems through redun- dancy. Selected Areas in Communications, IEEE Journal on 25, 1 (January), 15-24.
- Friedman, E., Resnick, P., and Sami, R. 2007. Algorithmic Game Theory. Cambridge University Press.
- Friedman, E. J. and Resnick, P. 2001. The social cost of cheap pseudonyms. Economics and Management Strategy 10(2), 173-199.
- Guha, R., Kumar, R., Raghavan, P., and Tomkins, A. 2004. Propagation of trust and distrust. In WWW '04: Proceedings of the 13th international conference on World Wide Web. ACM Press, New York, NY, USA, 403-412.
- Ham, M. and Agha, G. 2005. ARA: a robust audit to prevent free-riding in P2P networks. In Peer-to-Peer Computing, 2005. P2P 2005. Fifth IEEE International Conference on. 125-132.
- Houser, D. and Wooders, J. 2006. Reputation in auctions: Theory, and evidence from eBay. Journal of Economics and Management Strategy 15, 2 (June), 353-369.
- Jøsang, A., Ismail, R., and Boyd, C. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (March), 618-644.
- Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The EigenTrust algorithm for reputation management in P2P networks. In WWW '03: Proceedings of the 12th international conference on World Wide Web. ACM Press, New York, NY, USA, 640-651.
- Khopkar, T., Li, X., and Resnick, P. 2005. Self-selection, slipping, salvaging, slacking, and stoning: the impacts of negative feedback at eBay. In EC '05: Proceedings of the 6th ACM conference on Electronic commerce. ACM Press, New York, NY, USA, 223-231.
- Lai, K., Feldman, M., Stoica, I., and Chuang, J. 2003. Incentives for cooperation in peer-to- peer networks. In Workshop on Economics of Peer-to-Peer Systems.
- Lee, S., Sherwood, R., and Bhattacharjee, B. 2003. Cooperative peer groups in nice. In IEEE Infocom.
- Levien, R. 2003. Attack Resistant Trust Metrics. Ph.D. thesis, University of California at Berkeley. Draft available at http://www.levien.com/thesis/compact.pdf.
- Li, F. and Wu, J. 2007. Mobility reduces uncertainty in MANETs. In Proceedings of IEEE INFOCOM.
- Lian, Q., Zhang, Z., Yang, M., Zhao, B., Dai, Y., and Li, X. 2007. An empirical study of collusion behavior in the Maze P2P file-sharing system. In Distributed Computing Systems. ICDCS '07. 27th International Conference on. IEEE Computer Society, Washington, DC, USA.
- Lin, K., Lu, H., Yu, T., and Tai, C. 2005. A reputation and trust management broker frame- work for web applications. In Proceedings of the 2005 IEEE International Conference on e- Technology, e-Commerce and e-Service (EEE'05). IEEE Computer Society Washington, DC, USA, 262-269.
- Marti, S. and Garcia-Molina, H. 2004. Limited reputation sharing in P2P systems. In EC '04: Proceedings of the 5th ACM conference on Electronic commerce. ACM Press, New York, NY, USA, 91-101.
- Marti, S. and Garcia-Molina, H. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks: The International Journal of Computer and Telecommunications Networking 50, 472 -484.
- Matei, R., Iamnitchi, A., and Foster, P. 2002. Mapping the Gnutella network. Internet Computing, IEEE 6, 1 (Jan.-Feb.), 50-57.
- Michiardi, P. and Molva, R. 2002. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security. Kluwer, B.V., Deventer, The Netherlands, The Netherlands, 107-121.
- Morselli, R., Katz, J., and Bhattacharjee, B. 2004. A game-theoretic framework for analyzing trust-inference protocols. In Second Workshop on the Economics of Peer-to-Peer Systems.
- Nandi, A., Ngan, T.-W., Singh, A., Druschel, P., and Wallach, D. S. 2005. Scrivener: Providing incentives in cooperative content distribution systems. In ACM/IFIP/USENIX 6th International Middleware Conference. Middleware 2005 1, 1 (November), 270-291.
- Page, L., Brin, S., Motwani, R., and Winograd, T. 1998. The PageRank citation ranking: Bringing order to the web. Tech. rep., Stanford Digital Library Technologies Project.
- Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A., and Venkataramani, A. 2007. Do incentives build robustness in BitTorrent? In Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI).
- Ratnasamy, S., Francis, P., Handley, M., Karp, R., and Shenker, S. 2000. A scalable content addressable network. Tech. Rep. TR-00-010, UC Berkeley.
- Reed, I. S. and Solomon, G. 1960. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics 8, 2 (June), 300-304.
- Resnick, P., Kuwabara, K., Zeckhauser, R., and Friedman, E. 2000. Reputation systems. Communications of the ACM 43, 12, 45-48.
- Resnick, P., Zeckhauser, R., Swanson, J., and Lockwood, K. 2006. The value of reputation on eBay: A controlled experiment. Experimental Economics 9, 2 (June), 79-101.
- Rowstron, A. and Druschel, P. 2001. Pastry: scalable, distributed object location and rout- ing for large-scale peer-to-peer systems. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware) 11, 329-350.
- Singh, A. and Liu, L. 2003. TrustMe: anonymous management of trust relationships in decen- tralized P2P systems. In Third International Conference on Peer-to-Peer Computing, 2003. (P2P 2003). 142-149.
- Song, S., Hwang, K., Zhou, R., and Kwok, Y.-K. 2005. Trusted P2P transactions with fuzzy reputation aggregation. Internet Computing, IEEE 9, 6 (Nov.-Dec.), 24-34.
- Srivatsa, M., Xiong, L., and Liu, L. 2005. TrustGuard: countering vulnerabilities in reputa- tion management for decentralized overlay networks. In WWW '05: Proceedings of the 14th international conference on World Wide Web. ACM Press, New York, NY, USA, 422-431.
- Stoica, I., Morris, R., Karger, D., Kaashoek, F., and Balakrishnan, H. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 ACM SIGCOMM Conference. 149-160.
- Survey. 2005. E-crime watch survey. http://www.cert.org/archive/pdf/ecrimesurvey05.pdf.
- Suryanarayana, G. and Taylor, R. N. 2004. A survey of trust management and resource discovery technologies in peer-to-peer applications. Tech. Rep. UCI-ISR-04-6, UC Irvine. July.
- Walsh, K. and Sirer, E. G. 2006. Experience with an object reputation system for peer-to-peer filesharing. In Symposium on Networked System Design and Implementation (NSDI).
- Xiong, L. and Liu, L. 2002. Building trust in decentralized peer-to-peer electronic communities. In International Conference on Electronic Commerce Research (ICECR-5).
- Xiong, L. and Liu, L. 2003. A reputation-based trust model for peer-to-peer e-commerce com- munities. In IEEE Conference on Electronic Commerce.
- Xiong, L., Liu, L., and Ahamad, M. 2005. Countering sparsity and vulnerabilities in reputation systems. Tech. Rep. TR-2005-017-A, Emory University.
- Yu, B. and Singh, M. P. 2000. A social mechanism of reputation management in electronic com- munities. In Proceedings of the 4th International Workshop on Cooperative Information Agents IV, The Future of Information Agents in Cyberspace. Cooperative Information Agents 1, 1, 154-165.
- Yu, H., Gibbons, P., Kaminsky, M., and Xiao, F. 2008. A near-optimal social network defense against sybil attacks. In Proceedings of the 2008 IEEE Symposium on Security and Privacy.
- Yu, H., Kaminsky, M., Gibbons, P. B., and Flaxman, A. 2006. SybilGuard: defending against Sybil attacks via social networks. In SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. ACM Press, New York, NY, USA, 267-278.
- Zage, D. J. and Nita-Rotaru, C. 2007. On the accuracy of decentralized network coordinates in adversarial networks. In CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM Press, New York, NY, USA.
- Zhao, B. Y., Kubiatowicz, J. D., and Joseph, A. D. 2001. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Tech. Rep. UCB/CSD-01-1141, UC Berkeley. April.
- Zhou, R. and Hwang, K. 2006. Trust overlay networks for global reputation aggregation in P2P grid computing. In Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. 20th International. 10pp.
- Zhou, R. and Hwang, K. 2007. PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. Parallel and Distributed Systems, IEEE Transactions on 18, 4, 460- 473.
- Zimmermann, P. 1995. The official PGP user's guide. MIT Press Cambridge, MA, USA. Received September 2007; revised March 2008; accepted Month Year