Using Trust and Reputation for Detecting Groups of Colluded Agents in Social Networks

被引:0
作者
Cotronei, Mariantonia [1 ]
Giuffre, Sofia [1 ]
Marciano, Attilio [1 ]
Rosaci, Domenico [1 ]
Sarne, Giuseppe M. L. [2 ]
机构
[1] Mediterranea Univ Reggio Calabria, Dept Informat Engn Infrastruct & Sustainable Energ, I-89124 Reggio Di Calabria, Italy
[2] Univ Milano Bicocca, Dept Psychol, I-20126 Milan, Italy
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Social networking (online); Reliability; Robustness; Reliability engineering; Peer-to-peer computing; Vehicle dynamics; Time measurement; Software; Particle measurements; Heuristic algorithms; Multi-agent systems; recursive models; reputation; social networks; trust; SYSTEMS; MODEL;
D O I
10.1109/ACCESS.2024.3522560
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most common types of malicious behavior in social networks is represented by collusion, which consists of a secret cooperation between two or more agents providing mutual, highly positive feedback to each other. This collusion creates misleading advantages for the involved agents, deceiving others and distorting the actual reputation perception of the colluding members. Although the well-known EigenTrust algorithm can be fruitfully used to detect colluded agents, two important issues arise which limit its effectiveness: 1) it requires input information about which agents can be a-priori considered particularly trustworthy; and 2) it is not designed to handle situations in which we have several, different groups of colluded agents. These problems lead EigenTrust, to produce a significant number of false positives in some real situations. In this paper, we address the aforementioned issues. We introduce an automatic procedure to provide EigenTrust with the necessary inputs, and we propose an appropriate algorithm that combines EigenTrust with a clustering process. This procedure groups agents based on their reputation scores to tackle the presence of different groups of colluded agents. Through experiments, we demonstrate that our method, while maintaining the same effectiveness as EigenTrust in detecting malicious agents, is significantly more capable of avoiding the generation of false positives.
引用
收藏
页码:1511 / 1521
页数:11
相关论文
共 64 条
[1]  
Abrams Z, 2005, ACM SIGECOM EXCH, V5, P21
[2]  
ACDL[EB/OL], 2023, About us
[3]   A simulation testbed for analyzing trust and reputation mechanisms in unreliable online markets [J].
Adamopoulou, Anna A. ;
Symeonidis, Andreas L. .
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2014, 13 (05) :368-386
[4]   A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Haseeb, Khalid ;
Khan, Abdul Waheed .
FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) :280-296
[5]   MV-Checker: A software tool for multi-valued model checking intelligent applications with trust and commitment [J].
Alwhishi, Ghalya ;
Bentahar, Jamal ;
Elwhishi, Ahmed ;
Pedrycz, Witold .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 245
[6]  
Amazon, 2023, about us
[7]   A Trust Model for Informed Agent Collaboration in Complex Tasks [J].
Barbosa, Ricardo ;
Santos, Ricardo ;
Novais, Paulo .
INTELLIGENT COMPUTING, VOL 3, 2024, 2024, 1018 :61-76
[8]   Benchmarking reputation systems: A quantitative verification approach [J].
Bidgoly, Amir Jalaly ;
Ladani, Behrouz Tork .
COMPUTERS IN HUMAN BEHAVIOR, 2016, 57 :274-291
[9]   Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers [J].
Bidgoly, Amir Jalaly ;
Ladani, Behrouz Tork .
COMPUTER JOURNAL, 2015, 58 (10) :2567-2582
[10]   THE DYNAMICS OF SELLER REPUTATION: EVIDENCE FROM EBAY [J].
Cabral, Luis ;
Hortacsu, Ali .
JOURNAL OF INDUSTRIAL ECONOMICS, 2010, 58 (01) :54-78