Detecting false testimonies in reputation systems using self-organizing maps

被引:1
作者
Bankovic, Z. [1 ]
Vallejo, J. C. [1 ]
Fraga, D. [1 ]
Moya, J. M. [1 ]
机构
[1] Univ Politecn Madrid, Dept Ingn Elect, E-28040 Madrid, Spain
关键词
Reputation systems; bad mouthing; ballot stuffing; self-organizing maps; TRUST; SECURITY;
D O I
10.1093/jigpal/jzs028
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario, the attackers collude to give negative feedback on the victim in order to lower or destroy its reputation. This attack is known as bad mouthing attack. In another scenario, a number of entities agree to give positive feedback on an entity (often with adversarial intentions). This attack is known as ballot stuffing. Both attack types can significantly deteriorate the performances of the network. The existing solutions for coping with these attacks are mainly concentrated on prevention techniques. In this work, we propose a solution that detects and isolates the abovementioned attackers, impeding them in this way to further spread their malicious activity. The approach is based on detecting outliers using clustering, in this case self-organizing maps. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrate the capability of the approach in detecting both bad mouthing and ballot stuffing attack in various scenarios.
引用
收藏
页码:549 / 559
页数:11
相关论文
共 17 条
[1]   Peer-to-peer wireless LAN consortia: Economic modeling and architecture [J].
Antoniadis, P ;
Courcoubetis, C ;
Efstathiou, EC ;
Polyzos, GC ;
Strulo, B .
THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, :198-199
[2]  
BAREL H, 2003, INTRO SIDE CHANNEL A
[3]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[4]   Neural visualization of network traffic data for intrusion detection [J].
Corchado, Emilio ;
Herrero, Alvaro .
APPLIED SOFT COMPUTING, 2011, 11 (02) :2042-2056
[5]  
Dellarocas C., 2000, EC'00. Proceedings of the 2nd ACM Conference on Electronic Commerce, P150, DOI 10.1145/352871.352889
[6]  
Fritzke B., 1995, Advances in Neural Information Processing Systems 7, P625
[7]  
Haykin S., 1999, Neural Networks: A Comprehensive Foundation, DOI DOI 10.1017/S0269888998214044
[8]   A logic of trust and reputation [J].
Herzig, Andreas ;
Lorini, Emiliano ;
Huebner, Jomi F. ;
Vercouter, Laurent .
LOGIC JOURNAL OF THE IGPL, 2010, 18 (01) :214-244
[9]  
Liu S, 2010, INT C AUT AG MULT SY, P1577
[10]   Trust management systems for wireless sensor networks: Best practices [J].
Lopez, Javier ;
Roman, Rodrigo ;
Agudo, Isaac ;
Fernandez-Gago, Carmen .
COMPUTER COMMUNICATIONS, 2010, 33 (09) :1086-1093