Advertisement

Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps

  • Z. Banković
  • J. C. Vallejo
  • D. Fraga
  • J. M. Moya
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6694)

Abstract

It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario the attackers collude to give negative feedback on the victim in order to lower or destroy its reputation. This attack is known as bad mouthing attack, and it can significantly deteriorate the performances of the network. The existing solutions for coping with bad mouthing are mainly concentrated on prevention techniques. In this work we propose a solution that detects and isolates the above mentioned attackers, impeding them in this way to further spread their malicious activity. The approach is based on detecting outliers using clustering, in this case self-organizing maps. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrates the capability of the approach in detecting bad mouthing attack in various scenarios.

Keywords

reputation systems bad mouthing detection self-organizing maps 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Moya, J.M., Araujo, A., Bankovic, Z., de Goyeneche, J.M., Vallejo, J.C., Malagon, P., Villanueva, D., Fraga, D., Romero, E., Blesa, J.: Improving security for SCADA sensor networks with reputation systems and Self-Organizing maps. Sensors 9, 9380–9397 (2009)CrossRefGoogle Scholar
  2. 2.
    Boukerch, A., Xu, L., EL-Khatib, K.: Trust-based Security for Wireless Ad Hoc and Sensor Networks. Comput. Commun. 30, 2413–2427 (2007)CrossRefGoogle Scholar
  3. 3.
    Papaioannou, T.G., Stamoulis, G.D.: Effective use of reputation of peer-to-peer environments. In: Proceedings of IEEE/ACM CCGRID 2004, GP2PC Workshop, April 19-22, pp. 259–268. IEEE Comp. Soc., Chicago (2004)Google Scholar
  4. 4.
    Antoniadis, P., Courcoubetis, C., Efstathiou, E., Polyzos, G., Strulo, B.: Peer-to-Peer wireless LAN consortia: Economic modeling and architecture. In: 3rd IEEE International Conference on Peer-to-Peer Computing, pp. 198–199. IEEE Comp. Soc., Los Alamitos (2003)Google Scholar
  5. 5.
    Lou, J.-K., Chen, K.-T., Lei, C.-L.: A collusion-resistant automation scheme for social moderation systems. In: 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 571–575. IEEE Press, Piscataway (2009)Google Scholar
  6. 6.
    Bar El, H.: Introduction to Side Channel Attacks. White Paper. Discretix Technologies Ltd. (2003)Google Scholar
  7. 7.
    Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: 2nd ACM Conference on Electronic Commerce, pp. 150–157. ACM, New York (2000)Google Scholar
  8. 8.
    Liu, S., Miao, C., Theng, Y.-L., Kot, A.C.: A clustering approach to filtering unfair testimonies for reputation systems (Extended Abstract). In: van der Hoek, Kaminka, L., Luck., Sen (eds.) Int. Conf. on Autonomous Agents and Multiagent Systems, pp. 1577–1578 (2010)Google Scholar
  9. 9.
    Lou, J.-K., Chen, K.-T., Lei, C.-L.: A collusion-resistant automation scheme for social moderation systems. In: 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 571–575. IEEE Press, Piscataway (2009)Google Scholar
  10. 10.
    Rieck, K., Laskov, P.: Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 9, 23–48Google Scholar
  11. 11.
    Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: Best practices. Comput. Commun. (2010)Google Scholar
  12. 12.
    Haykin, S.: Neural networks - A comprehensive foundation, 2nd edn. Prentice-Hall, Englewood Cliffs (1999)zbMATHGoogle Scholar
  13. 13.
    Fritzke, B.: A Growing Neural Gas Network Learns Topologies. In: Tesauro, G., Touretzky, D.S., Leen, T.K. (eds.) Advances in Neural Information Processing Systems, vol. 7, pp. 625–632. MIT Press, Cambridge (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Z. Banković
    • 1
  • J. C. Vallejo
    • 1
  • D. Fraga
    • 1
  • J. M. Moya
    • 1
  1. 1.Dep. Ingeniería ElectrónicaUniversidad Politécnica de MadridMadridSpain

Personalised recommendations