CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections

by Asha Baby, A. Kumaresan, K. Vijayakumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 1
Year of Publication: 2014
Authors: Asha Baby, A. Kumaresan, K. Vijayakumar
10.5120/16179-4763

Asha Baby, A. Kumaresan, K. Vijayakumar . A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections. International Journal of Computer Applications. 93, 1 ( May 2014), 17-21. DOI=10.5120/16179-4763

@article{ 10.5120/16179-4763,
author = { Asha Baby, A. Kumaresan, K. Vijayakumar },
title = { A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 1 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number1/16179-4763/ },
doi = { 10.5120/16179-4763 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:40.889911+05:30
%A Asha Baby
%A A. Kumaresan
%A K. Vijayakumar
%T A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 1
%P 17-21
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A reputation system collects feedbacks from users and aggregates these feedbacks as evidence and generates the aggregated results to the normal users. These aggregated results are called reputation scores. We can call this system as online feedback-based reputation system. To protect the reputation system many defense schemes have been developed. In this paper we propose a defense scheme; it is the combination of five modules. Evaluation based filtering, Time domain unfair rating detector, suspicious user correlation analysis, trust analysis based on Dempster-Shafer theory and malicious user identification and reputation recovery. This system identifies the items under attacks, the time when the attacks occur and unfair raters who insert unfair ratings. Compared with existing systems this system achieves detection of high unfair ratings and reduces the detection of false dishonest ratings.

References
  1. E. S. Page, "Continuous inspection schemes," Biometrika, vol. 41, no. 1/2, pp. 100–115, Jun. 1954.
  2. T. K. Philips, Monitoring Active Portfolios: The CUSUM Approach.
  3. A. Whitby, A. Jøsang, and J. Indulska, "Filtering out unfair ratings in Bayesian reputation systems," Icfain J. Manage. Res. , Vol. 4, no. 2, pp. 48–64, Feb. 2005.
  4. P. Laureti, L. Moret, Y. -C. Zhang, and Y. -K. Yu, "Information filtering via iterative refinement," Europhys. Lett. ,Vol. 75, no. 6, pp. 1006–1012, 2006.
  5. Y. Liu and Y. Sun,"Anomaly detection in feedback-based reputation systems through temporal and correlation analysis," in Proc. 2nd IEEEInt. Conf. Social Computing, Aug. 2010, pp. 65–72.
  6. Y. Liu and Y. Sun, "Securing Online Reputation System through Trust Modeling and Temporal Analysis".
  7. Y. Yang, Q. Feng, Y. Sun, and Y. Dai, "Reputation trap: A powerful attack on reputation system of file sharing p2p environment," in Proc. 4th Int. Conf. Security and Privacy in Communication Networks, Istanbul, Turkey, Sep. 2008.
  8. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "Sybilguard: Defending against Sybil attacks via social networks," in Proc. 2006 Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications, 2006, pp. 267–278.
  9. Y. Liu, Y. Sun and Alex C. Kot "Securing Online Reputation System through Dempster-Shafer Theory based Trust Model "
Index Terms

Computer Science
Information Sciences

Keywords

CUSUM detector Dempster-Shafer theory K-mean algorithm