On the parallel implementation of Goldberg's maximum flow algorithm
SPAA '92 Proceedings of the fourth annual ACM symposium on Parallel algorithms and architectures
The official PGP user's guide
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Flows in undirected unit capacity networks
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Running up the bid: detecting, predicting, and preventing reserve price shilling in online auctions
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
TrustDavis: A Non-Exploitable Online Reputation System
CEC '05 Proceedings of the Seventh IEEE International Conference on E-Commerce Technology
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Netprobe: a fast and scalable system for fraud detection in online auction networks
Proceedings of the 16th international conference on World Wide Web
The Role of Reputation Systems in Reducing On-Line Auction Fraud
International Journal of Electronic Commerce
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Ostra: leveraging trust to thwart unwanted communication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Mechanism design on trust networks
WINE'07 Proceedings of the 3rd international conference on Internet and network economics
Detecting fraudulent personalities in networks of online auctioneers
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Canal: scaling social network-based Sybil tolerance schemes
Proceedings of the 7th ACM european conference on Computer Systems
Aiding the detection of fake accounts in large scale social online services
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Reducing the history in decentralized interaction-based reputation systems
IFIP'12 Proceedings of the 11th international IFIP TC 6 conference on Networking - Volume Part II
Innocent by association: early recognition of legitimate users
Proceedings of the 2012 ACM conference on Computer and communications security
Defending against large-scale crawls in online social networks
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Iolaus: securing online content rating systems
Proceedings of the 22nd international conference on World Wide Web
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
Hi-index | 0.00 |
Online marketplaces are now a popular way for users to buy and sell goods over the Internet. On these sites, user reputations--based on feedback from other users concerning prior transactions--are used to assess the likely trustworthiness of users. However, because accounts are often free to obtain, user reputations are subject to manipulation through white-washing, Sybil attacks, and user collusion. This manipulation leads to wasted time and significant monetary losses for defrauded users, and ultimately undermines the usefulness of the online marketplace. In this paper, we propose Bazaar, a system that addresses the limitations of existing online marketplace reputation systems. Bazaar calculates user reputations using a max-flow-based technique over the network formed from prior successful transactions, thereby limiting reputation manipulation. Unlike existing approaches, Bazaar provides strict bounds on the amount of fraud that malicious users can conduct, regardless of the number of identities they create. An evaluation based on a trace taken froma real-world online marketplace demonstrates that Bazaar is able to bound the amount of fraud in practice, while only rarely impacting non-malicious users.