期刊文献+

基于推荐的抗攻击电子商务信任模型 被引量:2

Recommendation-based anti-attack trust model on E-commerce
下载PDF
导出
摘要 针对目前在线信誉系统面临的自我提升攻击、恶意诋毁攻击和漂白攻击三类常见的攻击,提出了一种基于推荐的集中式信任模型。该模型综合了用户间购买行为的相似度以及评价的时效性确定对某件商品的推荐信任值,同时结合基于自身交易经验的直接信任值,来获取对该商品的综合信任度。通过在真实交易数据中注入三类攻击进行仿真,实验结果证明,相对于现有的信誉管理模型,该模型能更好地抵御攻击,为消费者提供更准确的卖家和商品信誉值。 A recommendation-based centralized trust model was proposed to deal with three kinds of common attacks including selt'-promoting attack, slandering attack and whitewashing attack. The model calculated the similarity of consumption custom between buyers and the timdiness of the buyers' e,~aluatiou opinions to determine the recommendation trust value, and obtained the direct trust value on the basis of the buyer's own trading experience. According to the direct and recommendation trust value, composite trust value could be calculated. Simulations were given by injecting the three kinds of attacks into real transaction data. The results prove that, compared with the existing reputation management models, the proposed model can effectively prevent attacks, and provides more accurate reputation information of sellers and goods to consumers.
作者 邓攀 钟将
出处 《计算机应用》 CSCD 北大核心 2013年第12期3490-3493,3502,共5页 journal of Computer Applications
基金 国家科技支撑计划项目(2012BAH19F003) 国家973计划项目(2011CB302600)
关键词 自我提升攻击 恶意诋毁攻击 漂白攻击 推荐 集中式信任模型 时效性 self-promoting attack slandering attack whitewashing attack recommendation centralized trust model timeliness
  • 相关文献

参考文献16

  • 1中国互联网络信息中心(CNNlC).2012年中国网民消费行为调查报告-3C[R/OL](2013-01-15)[2013-06-01].http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/dzswbg/201301/d0130116_38522.htrn.
  • 2DAM1ANI E, VIMERCATI D C D, PARABOSCHI S, et al. A rep- utation-based approach for choosing reliable resources in peer-to-peer networks [ C] // Proceedings of the 9th ACM Conference on Comput- er and Communications Security. New York: ACM, 2002:207 - 216.
  • 3KAMVAR S D, SCHLOSSER M T, MOLINA H G. The eigentrust algorithm for reputation management in P2P networks [ C]// Pro- ceedings of the 12th International Conference on World Wide Web. New York: ACM, 2003:640-65l.
  • 4XIONG L, LIU L. A reputation-based trust model for peer-to-peer E-commerce communities [ C]// Proceedings IEEE International Conference on Electronic Commerce. Piscataway: IEEE, 2003:275 - 284.
  • 5ARINGHIERI R, DAMIANI E, VIMERCAT1 S D D, et al. Fuzzy techniques for trust and reputation management in anonymous peer- to-peer systems [ J]. Journal of the American Society for Information Science and Technology, 2006, 57(4): 528-537.
  • 6SRIVTSA M, XIONG L, LIU L. TrustGuard: countering vulnerabil- ities in reputation management for decentralized overlay networks [ C]// Proceedings of the 14th International Conference on World Wide Web. New York: ACM, 2005:422 -431.
  • 7ZHOU R, HWANG K. PowerTrost: a robust and scalable reputation system for trusted peer-to-peer computing [ J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4) : 460 -473.
  • 8RESNICK P, ZECKHAUSER R. Trust among strangers in Internet transactions: empirical analysis of eBay's reputation system [ J]. The Economics of the Internet and E-Commerce, 2002, 11:127 - 157.
  • 9HOFFMAN K, ZAGE D, ROTARU C N. A survey of attack and de- fense techniques for reputation systems [ J]. ACM Computing Sur- veys, 2009, 42(1): 1-19.
  • 10魏锋,李杰,胡江明.一种基于优先度推荐的新型P2P网络信任模型[J].计算机应用研究,2010,27(6):2271-2272. 被引量:6

二级参考文献36

共引文献153

同被引文献33

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部