Quantifying Robustness of Trust Systems against Collusive Unfair Rating Attacks Using Information Theory

被引:0
|
作者
Wang, Dongxia [1 ]
Muller, Tim [1 ]
Zhang, Jie [1 ]
Liu, Yang [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unfair rating attacks happen in existing trust and reputation systems, lowering the quality of the systems. There exists a formal model that measures the maximum impact of independent attackers [Wang et al., 2015] -based on information theory. We improve on these results in multiple ways: (1) we alter the methodology to be able to reason about colluding attackers as well, and (2) we extend the method to be able to measure the strength of any attacks (rather than just the strongest attack). Using (1), we identify the strongest collusion attacks, helping construct robust trust system. Using (2), we identify the strength of (classes of) attacks that we found in the literature. Based on this, we help to overcome a shortcoming of current research into collusion-resistance -specific (types of) attacks are used in simulations, disallowing direct comparisons between analyses of systems.
引用
收藏
页码:111 / 117
页数:7
相关论文
共 50 条
  • [41] An Improvement of Robustness against Physical Attacks and Equipment Independence in Information Hiding based on the Artificial Fiber Pattern
    Kaneda, Kitahiro
    Fujii, Yuki
    Iwamura, Keiichi
    Hangai, Seiichiro
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 608 - 612
  • [42] Using Randomness to Improve Robustness of Tree-based Models Against Evasion Attacks
    Yang, Fan
    Chen, Zhiyuan
    Gangopadhyay, Aryya
    PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA '19), 2019, : 25 - 35
  • [43] Using Randomness to Improve Robustness of Tree-Based Models Against Evasion Attacks
    Yang, Fan
    Chen, Zhiyuan
    Gangopadhyay, Aryya
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (02) : 969 - 982
  • [44] Robustness of Quantum Cryptography Systems with Phase-Time Coding against Active Probing Attacks
    Molotkov, S. N.
    JOURNAL OF EXPERIMENTAL AND THEORETICAL PHYSICS, 2020, 131 (06) : 877 - 894
  • [45] Quantifying interactions among car drivers using information theory
    Roy, Subhradeep
    CHAOS, 2020, 30 (11)
  • [46] Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach
    Tan, Qi
    Li, Qi
    Zhao, Yi
    Liu, Zhuotao
    Guo, Xiaobing
    Xu, Ke
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 325 - 342
  • [47] InfOrmation theory based detection against network behavior mimicking DDoS attacks
    Yu, Shui
    Zhou, Wanlei
    Doss, Robin
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (04) : 319 - 321
  • [48] Robustness evaluation of trust and reputation systems using a deep reinforcement learning approach
    Bidgoly, Amir Jalaly
    Arabi, Fereshteh
    COMPUTERS & OPERATIONS RESEARCH, 2023, 156
  • [49] Topology based rating of kinematic chains and inversions using information theory
    Rao, AC
    MECHANISM AND MACHINE THEORY, 1998, 33 (07) : 1055 - 1062
  • [50] Using Trust Management to Defend against Routing Disruption Attacks for Cognitive Radio Networks
    Hou, Ling
    Wong, Angus K. Y.
    Yeung, Alan K. H.
    Choy, Steven S. O.
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-CHINA (ICCE-CHINA), 2016,