An unsupervised strategy for defending against multifarious reputation attacks

被引:0
|
作者
Xin Wang
Shu-juan Ji
Yong-quan Liang
Ho-fung Leung
Dickson K.W. Chiu
机构
[1] Shandong University of Science and Technology,Network and Information Center
[2] Shandong University of Science and Technology,Key Laboratory for wisdom mine information technology of Shandong Province
[3] The Chinese University of Hong Kong,Department of Computer Science and Engineering
[4] The University of Hong Kong,Faculty of Education
来源
Applied Intelligence | 2019年 / 49卷
关键词
Reputation attack; Nearest neighbor search; Lenient reviewer; Strict reviewer; Behavior expectation theory;
D O I
暂无
中图分类号
学科分类号
摘要
In electronic markets, malicious sellers often employ reviewers to carry out different types of attacks to improve their own reputations or destroy their opponents’ reputations. As such attacks may involve deception, collusion, and complex strategies, maintaining the robustness of reputation evaluation systems remains a challenging problem. From a platform manager’s view, no trader can be taken as a trustable benchmark for reference, therefore, accurate filtration of dishonest sellers and fraud reviewers and precise presentation of users’ reputations remains a challenging problem. Based on impression theory, this paper presents an unsupervised strategy, which first design a nearest neighbor search algorithm to select some typical lenient reviewers and strict reviewers. Then, based on these selected reviewers and the behavior expectation theory in impression theory, this paper adopts a classification algorithm that pre-classify sellers into honest and dishonest ones. Thirdly, another classification algorithm is designed to classify reviewers (i.e., buyers) into honest, dishonest, and uncertain ones according to their trading experiences with the pre-classified sellers. Finally, based on the ratings of various reviewers, this paper proposes a formula to estimate seller reputations. We further designed two general sets of experiments over simulated data and real data to evaluate our scheme, which demonstrate that our unsupervised scheme outperforms benchmark strategies in accurately estimating seller reputations. In particular, this strategy can robustly defend against various common attacks and unknown attacks.
引用
收藏
页码:4189 / 4210
页数:21
相关论文
共 50 条
  • [1] An unsupervised strategy for defending against multifarious reputation attacks
    Wang, Xin
    Ji, Shu-juan
    Liang, Yong-quan
    Leung, Ho-fung
    Chiu, Dickson K. W.
    [J]. APPLIED INTELLIGENCE, 2019, 49 (12) : 4189 - 4210
  • [2] Defending against speculative attacks: The policy maker's reputation
    Huang, Chong
    [J]. JOURNAL OF ECONOMIC THEORY, 2017, 171 : 1 - 34
  • [3] An impression-based strategy for defending reputation attacks in multi-agent reputation system
    Wang, Xin
    Ji, Shu-juan
    Liang, Yong-quan
    Chiu, Dickson K. W.
    [J]. PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2016, : 383 - 388
  • [4] A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis
    Ma H.
    Liang Y.
    Ji S.
    Li D.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018, 55 (12): : 2685 - 2702
  • [5] Taxonomy of reputation-based defending mechanisms against types of attacks in delay tolerant networks
    Nagrath P.
    Aneja S.
    Purohit G.N.
    [J]. International Journal of Security and Networks, 2021, 16 (02) : 77 - 91
  • [6] A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks
    Ji, Shujuan
    Ma, Haiyan
    Liang, Yongquan
    Leung, Hofung
    Zhang, Chunjin
    [J]. APPLIED INTELLIGENCE, 2017, 47 (04) : 1115 - 1131
  • [7] A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution
    Weidong FANG
    Wuxiong ZHANG
    Yang YANG
    Yang LIU
    Wei CHEN
    [J]. Science China(Information Sciences), 2017, 60 (04) : 60 - 70
  • [8] A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution
    Fang, Weidong
    Zhang, Wuxiong
    Yang, Yang
    Liu, Yang
    Chen, Wei
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (04)
  • [9] A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution
    Weidong Fang
    Wuxiong Zhang
    Yang Yang
    Yang Liu
    Wei Chen
    [J]. Science China Information Sciences, 2017, 60
  • [10] A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks
    Shujuan Ji
    Haiyan Ma
    Yongquan Liang
    Hofung Leung
    Chunjin Zhang
    [J]. Applied Intelligence, 2017, 47 : 1115 - 1131