Collusion detection in feedback-based reputation systems via temporal and social analysis

Nowadays, with the expansion of virtual spaces, interactions between anonymous users have also increased. These interactions can provide new opportunities and threats for users of this virtual spaces. One way to reduce these threats in such spaces is to use feedback-based reputation systems to estimate the trustworthiness of users. However, the feedback-based reputation systems are known to be particularly vulnerable to some kinds of attacks like collusion attacks between malicious user IDs. In this paper, a new method based on temporal and social analysis is proposed to deal with this kind of attack. In the proposed method, temporal analysis is used to detect users under attack as well as suspicious intervals in which the attacks have occurred with high probability; besides, social analysis can be used to distinguish between honest and malicious user IDs. The method used in the social analysis can be seen as the novelty of this paper whose main idea is the use of a small gap among the social graph of honest and malicious users to make a distinction between users in suspicious intervals. The experimental results proved that the proposed method has a better performance in distinguishing between honest and malicious users compared to earlier methods. This improvement in the performance can play a significant role in restoring and modifying users' reputations.

[1]  Haiying Shen,et al.  Leveraging Social Networks to Combat Collusion in Reputation Systems for Peer-to-Peer Networks , 2013, IEEE Transactions on Computers.

[2]  P. Resnick,et al.  The value of reputation on eBay: A controlled experiment , 2006 .

[3]  Steven Kay,et al.  Defending online reputation systems against collaborative unfair raters through signal modeling and trust , 2009, SAC '09.

[4]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[5]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[6]  Yan Sun,et al.  Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..

[7]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[8]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[9]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[10]  Siyuan Liu,et al.  Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Jun Li,et al.  The online auction market in China: a comparative study between Taobao and eBay , 2005, ICEC '05.

[12]  Chunyan Miao,et al.  An Entropy-Based Approach to Protecting Rating Systems from Unfair Testimonies , 2006, IEICE Trans. Inf. Syst..

[13]  Martín Abadi,et al.  A calculus for access control in distributed systems , 1991, TOPL.

[14]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[15]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[16]  Yuhong Liu,et al.  Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis , 2010, 2010 IEEE Second International Conference on Social Computing.

[17]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .