Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS)

Feedback reputation systems are gaining popularity as dealing with unfair ratings in reputation systems has been recognized as an important but difficult task. This problem is challenging when the number of true user ratings is relatively small and unfair ratings plays majority in rated values. In this paper, we propose a new method to find malicious users in online reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS). Here the effort is mainly concentrated on abnormals in both rating-values domain and the malicious users domain. MBACS is very efficient to detect malicious user ratings and aggregate trustful ratings. The proposed reputation system is evaluated through simulations, MBACS system can significantly reduce the impact of unfair ratings.

[1]  Steven Kay,et al.  Defending online reputation systems against collaborative unfair raters through signal modeling and trust , 2009, SAC '09.

[2]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[3]  Peter Szolovits,et al.  Ratings in Distributed Systems: A Bayesian Approach , 2002 .

[4]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[5]  Yafei Yang,et al.  Detection of collusion behaviors in online reputation systems , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[6]  Chrysanthos Dellarocas The Digitization of Word-of-Mouth: Promise and Challenges of Online Reputation Systems , 2001 .

[7]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[8]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[9]  Ting Yu,et al.  Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems , 2011, 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing.

[10]  Anmin Fu,et al.  RepHi: A novel attack against P2P reputation systems , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[11]  Yuhong Liu,et al.  Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis , 2010, 2010 IEEE Second International Conference on Social Computing.