Trust Management for Unwanted Traffic Control

Trust Management for Unwanted Traffic Control

ISBN13: 9781466647657|ISBN10: 1466647655|EISBN13: 9781466647664
DOI: 10.4018/978-1-4666-4765-7.ch005
Cite Chapter Cite Chapter

MLA

Zheng Yan. "Trust Management for Unwanted Traffic Control." Trust Management in Mobile Environments: Autonomic and Usable Models, IGI Global, 2014, pp.94-129. https://doi.org/10.4018/978-1-4666-4765-7.ch005

APA

Z. Yan (2014). Trust Management for Unwanted Traffic Control. IGI Global. https://doi.org/10.4018/978-1-4666-4765-7.ch005

Chicago

Zheng Yan. "Trust Management for Unwanted Traffic Control." In Trust Management in Mobile Environments: Autonomic and Usable Models. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4765-7.ch005

Export Reference

Mendeley
Favorite

Abstract

The Internet has become the backbone of remote communications, networking, and computing. It offers an incentive platform for many services and applications. People’s lives have been dramatically changed by the fast growth of the Internet. However, it also provides an easy channel for distributing contents that are unwanted by users. Unwanted traffic includes malware, viruses, spam, intrusions, unsolicited commercial advertisements, or unexpected contents. This chapter discusses applying trust management technology to automatically conduct unwanted traffic control in the Internet, especially the mobile Internet. The authors propose a generic unwanted traffic control solution through trust management. It can control unwanted traffic from its source to destinations in a personalized manner according to trust evaluation at a Global Trust Operator and traffic and behavior analysis at hosts. Thus, it can support unwanted traffic control in both a distributed and centralized manner and in both a defensive and offensive way. Simulation-based evaluation shows that the solution is effective with regard to accuracy and efficiency for Botnet intrusion and DDoS intrusion via reflectors. It is also robust against a number of malicious system attacks, such as hide evidence attack, bad mouthing attack, on-off attack, malicious attack of ISP, and combinations, which are playing in conjunction with various traffic intrusions. Meanwhile, the solution can provide personalized unwanted traffic control based on unwanted traffic detection behaviors. A prototype system is implemented to illustrate its applicability for SMS spam control.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.