Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps
It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario the attackers collude to give negative feedback on the victim in order to lower or destroy its reputation. This attack is known as bad mouthing attack, and it can significantly deteriorate the performances of the network. The existing solutions for coping with bad mouthing are mainly concentrated on prevention techniques. In this work we propose a solution that detects and isolates the above mentioned attackers, impeding them in this way to further spread their malicious activity. The approach is based on detecting outliers using clustering, in this case self-organizing maps. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrates the capability of the approach in detecting bad mouthing attack in various scenarios.
Keywordsreputation systems bad mouthing detection self-organizing maps
Unable to display preview. Download preview PDF.
- 3.Papaioannou, T.G., Stamoulis, G.D.: Effective use of reputation of peer-to-peer environments. In: Proceedings of IEEE/ACM CCGRID 2004, GP2PC Workshop, April 19-22, pp. 259–268. IEEE Comp. Soc., Chicago (2004)Google Scholar
- 4.Antoniadis, P., Courcoubetis, C., Efstathiou, E., Polyzos, G., Strulo, B.: Peer-to-Peer wireless LAN consortia: Economic modeling and architecture. In: 3rd IEEE International Conference on Peer-to-Peer Computing, pp. 198–199. IEEE Comp. Soc., Los Alamitos (2003)Google Scholar
- 5.Lou, J.-K., Chen, K.-T., Lei, C.-L.: A collusion-resistant automation scheme for social moderation systems. In: 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 571–575. IEEE Press, Piscataway (2009)Google Scholar
- 6.Bar El, H.: Introduction to Side Channel Attacks. White Paper. Discretix Technologies Ltd. (2003)Google Scholar
- 7.Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: 2nd ACM Conference on Electronic Commerce, pp. 150–157. ACM, New York (2000)Google Scholar
- 8.Liu, S., Miao, C., Theng, Y.-L., Kot, A.C.: A clustering approach to filtering unfair testimonies for reputation systems (Extended Abstract). In: van der Hoek, Kaminka, L., Luck., Sen (eds.) Int. Conf. on Autonomous Agents and Multiagent Systems, pp. 1577–1578 (2010)Google Scholar
- 9.Lou, J.-K., Chen, K.-T., Lei, C.-L.: A collusion-resistant automation scheme for social moderation systems. In: 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 571–575. IEEE Press, Piscataway (2009)Google Scholar
- 10.Rieck, K., Laskov, P.: Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 9, 23–48Google Scholar
- 11.Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: Best practices. Comput. Commun. (2010)Google Scholar
- 13.Fritzke, B.: A Growing Neural Gas Network Learns Topologies. In: Tesauro, G., Touretzky, D.S., Leen, T.K. (eds.) Advances in Neural Information Processing Systems, vol. 7, pp. 625–632. MIT Press, Cambridge (1995)Google Scholar