Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Neural Networks: A Comprehensive Foundation
Neural Networks: A Comprehensive Foundation
Peer-to-Peer Wireless LAN Consortia: Economic Modeling and Architecture
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Effective use of reputation in peer-to-peer environments
CCGRID '04 Proceedings of the 2004 IEEE International Symposium on Cluster Computing and the Grid
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Linear-Time Computation of Similarity Measures for Sequential Data
The Journal of Machine Learning Research
A collusion-resistant automation scheme for social moderation systems
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Trust management systems for wireless sensor networks: Best practices
Computer Communications
A clustering approach to filtering unfair testimonies for reputation systems
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Reliable medical recommendation systems with patient privacy
ACM Transactions on Intelligent Systems and Technology (TIST) - Survey papers, special sections on the semantic adaptive social web, intelligent systems for health informatics, regular papers
Hi-index | 0.00 |
It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario the attackers collude to give negative feedback on the victim in order to lower or destroy its reputation. This attack is known as bad mouthing attack, and it can significantly deteriorate the performances of the network. The existing solutions for coping with bad mouthing are mainly concentrated on prevention techniques. In this work we propose a solution that detects and isolates the abovementioned attackers, impeding them in this way to further spread their malicious activity. The approach is based on detecting outliers using clustering, in this case self-organizing maps. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrates the capability of the approach in detecting bad mouthing attack in various scenarios.