Skip to main content

2018 | OriginalPaper | Buchkapitel

Identification for Strategically Malicious Participants

verfasst von : Xinxin Fan, Jingping Bi

Erschienen in: Web Services – ICWS 2018

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Trust metric as an effective manner to deal with diverse attacks has been successfully applied in realistic interactional networked systems, such as eBay, Amazon, etc. Nevertheless, the existence of strategically malicious behaviors, such as colluding and disguise attacks, prevents most existing trust metrics from inferring rational trust taking into account they markedly promotes the trust of misbehaved participants through collaborating with each other, hence relying only on the trust to conduct interactional behaviors among strange participants becomes inappropriate. In this paper, we propose a misbehavior identification mechanism TrustId through clustering different categories of participants into appropriate communities. The primary contributions include: (i) we propose an information entropy-controlled cluster algorithm with respect to diverse sophisticated interactional participants; (ii) we extract three facets of attributes to derive clustering for trust-enabled interactional networks; (iii) we conduct extensive experiments to evaluate the efficiency of our proposed misbehavior identification mechanism, and the results exhibit our TrustId correctly identifies strategically misbehaved participants and significantly outperforms EigenTrust and PathTrust against the representative colluding and disguise attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Supp. Syst. 43(2), 618–644 (2007)CrossRef Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Supp. Syst. 43(2), 618–644 (2007)CrossRef
2.
Zurück zum Zitat Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM (2003) Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM (2003)
3.
Zurück zum Zitat Fan, X., Liu, L., Li, M., Su, Z.: EigenTrust++: attack resilient trust management. In: Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 416–425 (2012) Fan, X., Liu, L., Li, M., Su, Z.: EigenTrust++: attack resilient trust management. In: Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 416–425 (2012)
4.
Zurück zum Zitat Fan, X., Liu, L., Li, M., Su, Z.: GroupTrust: dependable trust management. IEEE Trans. Parallel Distrib. Syst. 28(4), 1076–1090 (2017)CrossRef Fan, X., Liu, L., Li, M., Su, Z.: GroupTrust: dependable trust management. IEEE Trans. Parallel Distrib. Syst. 28(4), 1076–1090 (2017)CrossRef
5.
Zurück zum Zitat Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43(12), 45–48 (2000)CrossRef Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43(12), 45–48 (2000)CrossRef
6.
Zurück zum Zitat Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.: PathTrust: a trust-based reputation service for virtual organization formation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 193–205. Springer, Heidelberg (2006). https://doi.org/10.1007/11755593_15CrossRef Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.: PathTrust: a trust-based reputation service for virtual organization formation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 193–205. Springer, Heidelberg (2006). https://​doi.​org/​10.​1007/​11755593_​15CrossRef
7.
Zurück zum Zitat Can, A.B., Bhargava, B.: SORT: a self-organizing trust model for peer-to-peer systems. IEEE Trans. Dependable Secure Comput. 10(1), 14–27 (2013)CrossRef Can, A.B., Bhargava, B.: SORT: a self-organizing trust model for peer-to-peer systems. IEEE Trans. Dependable Secure Comput. 10(1), 14–27 (2013)CrossRef
8.
Zurück zum Zitat Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: Security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 1–22 (2017). Article 60CrossRef Gai, K., Qiu, L., Chen, M., Zhao, H., Qiu, M.: SA-EAST: Security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Trans. Embed. Comput. Syst. 16(2), 1–22 (2017). Article 60CrossRef
9.
Zurück zum Zitat Su, Z., Liu, L., Li, M., Fan, X., Zhou, Y.: Reliable and resilient trust management in distributed service provision networks. ACM Trans. Web 9(3), 1–37 (2015). Article 14CrossRef Su, Z., Liu, L., Li, M., Fan, X., Zhou, Y.: Reliable and resilient trust management in distributed service provision networks. ACM Trans. Web 9(3), 1–37 (2015). Article 14CrossRef
10.
Zurück zum Zitat MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281–297 (1967) MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281–297 (1967)
11.
Zurück zum Zitat Drineas, P., Frieze, A., Kannan, R., Vempala, S., Vinay, V.: Clustering large graphs via the singular value decomposition. Mach. Learn. 56(1), 9–33 (2004)CrossRef Drineas, P., Frieze, A., Kannan, R., Vempala, S., Vinay, V.: Clustering large graphs via the singular value decomposition. Mach. Learn. 56(1), 9–33 (2004)CrossRef
12.
Zurück zum Zitat Meilă, M.: The uniqueness of a good optimum for k-means. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 625–632. ACM (2006) Meilă, M.: The uniqueness of a good optimum for k-means. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 625–632. ACM (2006)
14.
Zurück zum Zitat Fan, X., Li, M., Ma, J., Ren, Y., Zhao, H., Su, Z.: Behavior-based reputation management in P2P file-sharing networks. J. Comput. Syst. Sci. 78(6), 1737–1750 (2012)MathSciNetCrossRef Fan, X., Li, M., Ma, J., Ren, Y., Zhao, H., Su, Z.: Behavior-based reputation management in P2P file-sharing networks. J. Comput. Syst. Sci. 78(6), 1737–1750 (2012)MathSciNetCrossRef
15.
Zurück zum Zitat Palal, N., Bezdek, J.: On cluster validity for the fuzzy c-means model. IEEE Trans. Fuzzy Syst. 3(3), 370–379 (1995)CrossRef Palal, N., Bezdek, J.: On cluster validity for the fuzzy c-means model. IEEE Trans. Fuzzy Syst. 3(3), 370–379 (1995)CrossRef
Metadaten
Titel
Identification for Strategically Malicious Participants
verfasst von
Xinxin Fan
Jingping Bi
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-94289-6_24

Premium Partner