2011
DOI: 10.1007/978-3-642-21323-6_2
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…These fabricated fake recommendations aim to ruin the reputation of the target entity. As a result, the system isolates the victim entity or decreases its opportunity of being chosen as a service-provider (Banković, Vallejo, Fraga, & Moya, 2011). The malicious entities remain to provide appropriate recommendations for the other entities.…”
Section: Biased Recommendationsmentioning
confidence: 99%
“…These fabricated fake recommendations aim to ruin the reputation of the target entity. As a result, the system isolates the victim entity or decreases its opportunity of being chosen as a service-provider (Banković, Vallejo, Fraga, & Moya, 2011). The malicious entities remain to provide appropriate recommendations for the other entities.…”
Section: Biased Recommendationsmentioning
confidence: 99%
“…LT construction is given in algorithm I in section 4.3. We assume that the network is free from bad mouthing attack [22], so the compromised node cannot manipulate LT values and compromised nodes do not work in cooperative fashion [23].…”
Section: Network Model and System Assumptionmentioning
confidence: 99%
“…In Sections 4.2 and 4.3, we present results of our various simulation scenarios, respectively. We also consider the algorithm proposed in [ 21 ], which detected inaccurate noise data, and the mechanism proposed in [ 27 ], which can be against bad mouthing attack to the reputation system. We take these algorithms for comparison to evaluate the performance of ARM in Section 4.4.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…In Scenario D, the numbers of abnormal and normal participants are in equivalent. Additionally, we draw inspiration from the bad mouthing attack [ 27 ] and assume that the malicious participants will collude with each other to reduce the reputation of normal participants.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation