A pre-evolutionary advisor list generation strategy for robust defensing reputation attacks

Abstract Trust and reputation systems are vital in large open distributed electronic commerce environments. Although existing various mechanisms have been adopted to guarantee trust between customers and sellers (or platforms), self-interested agents often impose various attacks to trust and reputation systems. As these attacks are usually deceptive, collusive, or strategic, it is difficult to keep trust and reputation systems robust to multifarious attacks. Many defense strategies employ a robust trust network (such as a trustable advisor list) for protecting buyers. However, in the evolution of a trust network, existing strategies consider only historical ratings of given buyers and advisors, while neglecting the timeliness of these ratings. Besides, only a single trust network is utilized to evaluate all sellers, leading to problems such as lack of pertinence and quite large deviation of evaluation. This paper proposes a novel pre-evolutionary advisor generation strategy, which first pre-evolves an optimal advisor list for each candidate seller before each trade and then evaluate each seller according to its corresponding list. After evaluating and selecting the seller, the buyer's own advisor list is evolved based on the pre-evolved optimal advisor list of chosen seller. Two sets of experiments have been designed to verify the general performance of this strategy, including accuracy, robustness, and stability. Results show that our strategy outperforms existing ones, especially when attackers use popular attack strategies such as Sybil, Sybil and Camouflage, and Sybil and Whitewashing. Besides, our strategy is more stable than compared ones, and its robustness will not change with the ratio of dishonest buyers.

[1]  Dickson K. W. Chiu,et al.  On the making of service recommendations: An action theory based on utility, reputation, and risk attitude , 2009, Expert Syst. Appl..

[2]  Shing-Chi Cheung,et al.  A Multi-Agent Infrastructure for Mobile Workforce Management in a Service Oriented Enterprise , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[3]  Georgios Zervas,et al.  Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud , 2015, Manag. Sci..

[4]  Jie Zhang,et al.  Robustness of Trust Models and Combinations for Handling Unfair Ratings , 2012, IFIPTM.

[5]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[6]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[7]  Chunyan Miao,et al.  AN INTEGRATED CLUSTERING‐BASED APPROACH TO FILTERING UNFAIR MULTI‐NOMINAL TESTIMONIES , 2014, Comput. Intell..

[8]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[9]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[10]  Jie Zhang,et al.  An evolutionary model for constructing robust trust networks , 2013, AAMAS.

[11]  Seema Bawa,et al.  A Privacy, Trust and Policy based Authorization Framework for Services in Distributed Environments , 2007 .

[12]  W. T. Williams,et al.  Dissimilarity Analysis: a new Technique of Hierarchical Sub-division , 1964, Nature.

[13]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[14]  Audun Jøsang,et al.  Robustness of Trust and Reputation Systems: Does It Matter? , 2012, IFIPTM.

[15]  Jie Zhang,et al.  A framework for trust modeling in multiagent electronic marketplaces with buying advisors to consider varying seller behavior and the limiting of seller bids , 2013, TIST.

[16]  Munindar P. Singh,et al.  Detecting deception in reputation management , 2003, AAMAS '03.

[17]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[18]  Chunyan Miao,et al.  iCLUB: an integrated clustering-based approach to improve the robustness of reputation systems , 2011, AAMAS.

[19]  Masahiro Kimura,et al.  Detecting changes in information diffusion patterns over social networks , 2013, TIST.

[20]  Dickson K. W. Chiu,et al.  Towards ubiquitous tourist service coordination and integration: a multi-agent and semantic web approach , 2005, ICEC '05.