An attack resistant method for detecting dishonest recommendations in pervasive computing environment

N. Iltaf, Abdul Ghafoor, Usman Zia
{"title":"An attack resistant method for detecting dishonest recommendations in pervasive computing environment","authors":"N. Iltaf, Abdul Ghafoor, Usman Zia","doi":"10.1109/ICON.2012.6506554","DOIUrl":null,"url":null,"abstract":"An attack resistant method for indirect trust computation (based on recommendation) for pervasive computing environment is proposed. The method extends a mechanism to detect outliers in dataset presented in [19] and apply it to filter out malicious recommendations in indirect trust computation. The method is based on a dissimilarity metric based on the statistical distribution of the recommendations grouped into recommendation classes. The proposed model has been evaluated in different attack scenarios (bad mouthing, ballot stuffing and random attack). The model has also been compared with other existing evolutionary recommendation models in this field, and it is shown that the proposed approach can effectively filter out dishonest recommendations provided that the number of dishonest recommendations is less than the number of honest recommendations.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 18th IEEE International Conference on Networks (ICON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICON.2012.6506554","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

An attack resistant method for indirect trust computation (based on recommendation) for pervasive computing environment is proposed. The method extends a mechanism to detect outliers in dataset presented in [19] and apply it to filter out malicious recommendations in indirect trust computation. The method is based on a dissimilarity metric based on the statistical distribution of the recommendations grouped into recommendation classes. The proposed model has been evaluated in different attack scenarios (bad mouthing, ballot stuffing and random attack). The model has also been compared with other existing evolutionary recommendation models in this field, and it is shown that the proposed approach can effectively filter out dishonest recommendations provided that the number of dishonest recommendations is less than the number of honest recommendations.
普适计算环境下不诚实推荐检测的一种抗攻击方法
提出了一种普适计算环境下基于推荐的间接信任计算抗攻击方法。该方法扩展了[19]中提出的一种检测数据集异常值的机制,并将其应用于间接信任计算中过滤恶意推荐。该方法基于基于分组推荐类的统计分布的不相似性度量。所提出的模型已经在不同的攻击场景(恶意攻击、选票填充和随机攻击)下进行了评估。将该模型与该领域现有的其他进化推荐模型进行了比较,结果表明,在不诚实推荐的数量小于诚实推荐的数量的情况下,该方法可以有效地过滤掉不诚实推荐。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信