• Türkçe
    • English
  • English 
    • Türkçe
    • English
  • Login
View Item 
  •   DSpace Home
  • Mühendislik Fakültesi
  • Bilgisayar Mühendisliği Bölümü
  • Bilgisayar Mühendisliği Bölümü Tez Koleksiyonu
  • View Item
  •   DSpace Home
  • Mühendislik Fakültesi
  • Bilgisayar Mühendisliği Bölümü
  • Bilgisayar Mühendisliği Bölümü Tez Koleksiyonu
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Eşler Arası Ağlarda Makine Öğrenimi Destekli Tutarlılık Temelli Güven Yönetimi

View/Open
Tez Metni v_1.3_2_AE.pdf (3.916Mb)
Date
2022-08-01
Author
Şahin, Yasin
xmlui.dri2xhtml.METS-1.0.item-emb
Acik erisim
xmlui.mirage2.itemSummaryView.MetaData
Show full item record
Abstract
Peer-to-peer (P2P) networks first emerged with file sharing and distribution applications. P2P networks continue their popularity with new usage areas such as cryptocurrencies, NFTs, and metaverse platforms. While peer-to-peer networks provide benefits such as infinite scalability with their decentralized structure, they need some rules and mechanisms to ensure service continuity in a consistent, robust and reliable manner. Due to their decentralized nature, P2P networks are vulnerable to manipulation by service providers and service receivers. Even for the systems like blockchain, which guarantee unchangeability of a record by using reliable encryption algorithms, there is a need for a separate trust mechanism that confirms the authenticity of the record in its original state. Therefore, trust management remains one of the most important research areas in P2P networks, although it has been studied for a long time. In this thesis, the trust models, which are needed to protect the peer-to-peer network from malicious behavior and to provide a reliable environment have been studied. Both service attacks and feedback attacks have been extensively investigated to obtain a complete model. In the first stage of the study, which was carried out in two stages, a statistical model based on consistency is proposed. Although this model has achieved very good performance in preventing service attacks, it cannot show the same level of performance in detecting some feedback attacks. In the second stage of the study, a trust model is proposed for wider attack scenarios by applying different machine learning methods. In this model, a feature set consisting of different groups of features was studied. Our results showed that we can achieve a more reliable peer-to-peer network when we apply machine learning after using our consistency-based model for filtering. It has also been observed that, as a result of the consistency-promoting nature of the model, trusted peers got better quality of service (QoS) and services were distributed among trusted peers more fairly.
URI
http://hdl.handle.net/11655/26933
xmlui.mirage2.itemSummaryView.Collections
  • Bilgisayar Mühendisliği Bölümü Tez Koleksiyonu [177]
Hacettepe Üniversitesi Kütüphaneleri
Açık Erişim Birimi
Beytepe Kütüphanesi | Tel: (90 - 312) 297 6585-117 || Sağlık Bilimleri Kütüphanesi | Tel: (90 - 312) 305 1067
Bizi Takip Edebilirsiniz: Facebook | Twitter | Youtube | Instagram
Web sayfası:www.library.hacettepe.edu.tr | E-posta:openaccess@hacettepe.edu.tr
Sayfanın çıktısını almak için lütfen tıklayınız.
Contact Us | Send Feedback



DSpace software copyright © 2002-2016  DuraSpace
Theme by 
Atmire NV
 

 


DSpace@Hacettepe
huk openaire onayı
by OpenAIRE

About HUAES
Open Access PolicyGuidesSubcriptionsContact

livechat

sherpa/romeo

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsTypeDepartmentPublisherLanguageRightsxmlui.ArtifactBrowser.Navigation.browse_indexFundingxmlui.ArtifactBrowser.Navigation.browse_subtypeThis CollectionBy Issue DateAuthorsTitlesSubjectsTypeDepartmentPublisherLanguageRightsxmlui.ArtifactBrowser.Navigation.browse_indexFundingxmlui.ArtifactBrowser.Navigation.browse_subtype

My Account

LoginRegister

Statistics

View Usage Statistics

DSpace software copyright © 2002-2016  DuraSpace
Theme by 
Atmire NV