The P2P network's open and anonymous nature offers an almost ideal environment for malicious activities. In this paper, we categorize current reputation management schemes which offer defenses against many attacks.
Our goal is to survey the present reputation management methods and propose a classification which facilitates a system analysis. We identify the main drawbacks which are common to all published methods and outline the possible solutions.