A reputation bootstrapping approach for computer network collaborative defense

  • Shiying Li
  • , Yang Yu
  • , Liangshuang Lü
  • , Chunhe Xia
  • , Zhong Li
  • , Liming Huan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Computer network collaborative defense is used to protect networks from collaborative attacks. To ensure the credible of defense entities, trust relationships are necessary to be established. When there are not enough history records for reputation evaluation, the reputation bootstrapping technique to establish an initial reputation value for newcomers based on limited record about their past behaviors becomes important and is short of a proper solution currently. We present a reputation bootstrapping approach. Our approach considers about different node types and gives each node a reputation different from each other, reflecting the specific status of the new nodes. Experimental results show that the approach minimizes the future failure rate of coordination.

Original languageEnglish
Title of host publicationProceedings - 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer, MEC 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2460-2465
Number of pages6
ISBN (Electronic)9781479925650
DOIs
StatePublished - 2013
Event2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer, MEC 2013 - Shenyang, China
Duration: 20 Dec 201322 Dec 2013

Publication series

NameProceedings - 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer, MEC 2013

Conference

Conference2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer, MEC 2013
Country/TerritoryChina
CityShenyang
Period20/12/1322/12/13

Keywords

  • Computer network collaborative defense
  • Defense cost
  • Defense node type
  • Reputation
  • Reputation bootstraping

Fingerprint

Dive into the research topics of 'A reputation bootstrapping approach for computer network collaborative defense'. Together they form a unique fingerprint.

Cite this