Full text
![]() Preview |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (1MB) |
Bankovic, Zorana, Vallejo López, Juan Carlos, Fraga Aydillo, David and Moya Fernández, José Manuel ORCID: https://orcid.org/0000-0003-4433-2296
(2013).
Detecting false testimonies in reputation systems using self-organizing maps.
"Logic Journal of the IGPL", v. 21
(n. 4);
pp. 549-559.
ISSN 1367-0751.
https://doi.org/10.1093/jigpal/jzs028.
Title: | Detecting false testimonies in reputation systems using self-organizing maps |
---|---|
Author/s: |
|
Item Type: | Article |
Título de Revista/Publicación: | Logic Journal of the IGPL |
Date: | August 2013 |
ISSN: | 1367-0751 |
Volume: | 21 |
Subjects: | |
Freetext Keywords: | Reputation systems, bad mouthing, ballot stuffing, self-organizing maps |
Faculty: | E.T.S.I. Telecomunicación (UPM) |
Department: | Ingeniería Electrónica |
Creative Commons Licenses: | Recognition - No derivative works - Non commercial |
![]() Preview |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (1MB) |
It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario, the attackers collude to give negative feedback on the victim in order to lower or destroy its reputation. This attack is known as bad mouthing attack. In another scenario, a number of entities agree to give positive feedback on an entity (often with adversarial intentions). This attack is known as ballot stuffing. Both attack types can significantly deteriorate the performances of the network. The existing solutions for coping with these attacks are mainly concentrated on prevention techniques. In this work, we propose a solution that detects and isolates the abovementioned attackers, impeding them in this way to further spread their malicious activity. The approach is based on detecting outliers using clustering, in this case self-organizing maps. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrate the capability of the approach in detecting both bad mouthing and ballot stuffing attack in various scenarios.
Item ID: | 28977 |
---|---|
DC Identifier: | https://oa.upm.es/28977/ |
OAI Identifier: | oai:oa.upm.es:28977 |
DOI: | 10.1093/jigpal/jzs028 |
Official URL: | http://jigpal.oxfordjournals.org/content/21/4/549.... |
Deposited by: | Memoria Investigacion |
Deposited on: | 04 Jun 2014 16:35 |
Last Modified: | 22 Sep 2014 11:43 |