期刊文献+

Collusion detector based on G-N algorithm for trust model

Collusion detector based on G-N algorithm for trust model
下载PDF
导出
摘要 In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes. In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期926-935,共10页 系统工程与电子技术(英文版)
基金 supported by the National Natural Science Foundation of China(61402241 61572260 61373017 61572261 61472192) the Scientific&Technological Support Project of Jiangsu Province(BE2015702)
关键词 trust model collusion detector G-N algorithm trust model collusion detector G-N algorithm
  • 相关文献

参考文献5

二级参考文献79

  • 1窦文,王怀民,贾焰,邹鹏.模拟谣言传播机制的无结构P2P网络中广播机制的研究[J].计算机研究与发展,2004,41(9):1460-1465. 被引量:20
  • 2李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 3王伟,曾国荪.一种基于Bayes信任模型的可信动态级调度算法[J].中国科学(E辑),2007,37(2):285-296. 被引量:22
  • 4石志国,贺也平,张宏.一种对等计算安全性的时间自衰减信任管理算法[J].计算机研究与发展,2007,44(1):1-10. 被引量:21
  • 5DONATO D, PANICCIA M, et al. New metrics for reputation management in P2P networks[A]. Proc of the 3rd International Workshop on Adversarial Information Retrieval on the Web[C]. 2007.65-72.
  • 6KAMVAR S D, SCHLOSSER M T, GARCIA M H. The eigentrust algorithm for reputation management in P2P network[A]. Proc of the 12th Int'l WWW Conf[C]. Budapest: ACM Press, 2003.640-651.
  • 7JφSANG A, ISMAIL R, BOYD C. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems. 2007, 43(2): 618-644.
  • 8KUMAR E GOPALAN S, SRIDHAR V. Q-chain: building reputation based trust chains in decentralized peer-to-peer networks[A]. International Conference on Collaborative Computing: Networking, Applications and Worksharing[C]. 2005.5-13.
  • 9REPANTIS T, KALOGERAKI V. Decentralized trust management for ad-hoc peer-to-peer networks[A]. 4th International Workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC)[C]. 2006.6-14.
  • 10ZHAO Y, HOU X, et al. Measurement study and application of social network in the maze p2p file-sharing system[A]. ACM International Conference Proceeding Series(152)[C]. 2006.57-61.

共引文献383

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部