Visualizing and Aggregating Behavior for Trust Evaluation

The Internet of Things or more broadly the Internet of Everything is becoming a possibility in the near future. A vast number of entities (i.e., devices, people, processes etc.) will require to connect to the Internet. These communications could be facilitated by new technologies, such as 5G communication, which aim to be faster by providing higher bandwidth guarantees. This higher network capacity will increase exponentially the volume of data that could be extracted from the Internet regarding individual user or entities' behavior and concurrently the number of attacks that could be deployed. Thus, it is becoming increasing challenging to evaluate the trustworthiness of entities on the Internet. The contribution of this paper is a new methodology of aggregating behavior that aids in evaluating individual trust. We introduce a basic methodology for calculating Trust, which is later extended through clustering of malicious events. Based on the proposed methodology, a GUI is implemented that allows the quick and easy visualization of malicious behavior with the corresponding trust calculation. Overall, this work aims to support existing trust models in terms of aggregating behavior and translating it into trustworthiness.

[1]  Munindar P. Singh,et al.  An adaptive probabilistic trust model and its evaluation , 2008, AAMAS.

[2]  E. Tulving,et al.  Episodic and semantic memory , 1972 .

[3]  Chen-Shu Wang,et al.  Attacking and Defending Perspective of E-Crime Behavior and Psychology: A Systemic Dynamic Simulation Approach , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).

[4]  Joseph R. Long,et al.  The Definition of a Trust , 1922 .

[5]  Jia Guo,et al.  A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems , 2015, 2015 IEEE International Conference on Services Computing.

[6]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[7]  Jianguo Chen,et al.  An Efficient Feedback-based Trust Model for Pervasive Computing , 2010, J. Digit. Content Technol. its Appl..

[8]  Amir Hussain,et al.  A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications , 2018, Cognitive Computation.

[9]  Athanasios V. Vasilakos,et al.  Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks , 2018, IEEE Transactions on Network and Service Management.

[10]  Ji Zhang,et al.  Detecting anomalies from big network traffic data using an adaptive detection approach , 2015, Inf. Sci..

[11]  R. Srikant,et al.  DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks , 2007, MobiCom '07.

[12]  Lance J. Hoffman,et al.  Trust beyond security: an expanded trust model , 2006, CACM.

[13]  Jose L. Muñoz,et al.  ad hoc networks.">A review of trust modeling in ad hoc networks , 2009, Internet Res..