期刊文献+

DS证据理论下融合隐式与显式特征的共谋攻击识别推理模型 被引量:2

Collusion Attack Identification Reasoning Model Fusing Implicit and Explicit Features Under DS Evidence Theory
下载PDF
导出
摘要 现有的攻击识别模型大多未能较好地解决共谋攻击对电子商务信任评价机制产生的威胁。为此,结合国内C2C电子商务的特点,以共谋攻击中的商品为识别对象,融合隐式和显式用户行为特征以及与交易和买家相关的复合特征,并根据DS证据理论处理不确定问题的优点,提出一种DS证据理论下的共谋攻击识别推理模型。在某电商平台真实共谋攻击数据上的实验结果表明,该推理模型能够识别共谋攻击,提取的攻击识别特征可反映用户真实行为,有效区分攻击和合法交易所涉及的商品。 Collusion attack produced a serious threat to e-commerce trust evaluation mechanism and the existing attack detection model is not able to solve the problem well, combined with the characteristics of domestic C2 C e-commerce,this paper uses the goods in collusion attack as the object of detection,f uses explicit and implicit user behavior feature and summary feature of related transactions and buyers,combining the advantages of DS evidence theory in dealing with uncertain problems,puts forward the collusion attack detection model under DS evidence theory. Experimental results based on the real collusion attacks data in e-commerce show that the proposed reasoning model can effectively identify the collusion attack,the extracted attacks can effectively reflect the user's real behavior, effectively distinguish between the goods involved in attacks and legitimate transactions.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第11期108-116,共9页 Computer Engineering
基金 国家自然科学基金"DS证据推理下抗信誉共谋攻击的行为信任研究"(71401045) 广东省自然科学基金(2017A030313394)
关键词 共谋攻击 特征提取 攻击识别 DS证据理论 遗传算法 collusion attack feature extraction attack identification DS evidence theory genetic algorithm
  • 相关文献

参考文献2

二级参考文献33

  • 1王继民,彭波.搜索引擎用户点击行为分析[J].情报学报,2006,25(2):154-162. 被引量:45
  • 2李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 3余慧佳,刘奕群,张敏,等.基于大规模日志分析的网络搜索引擎用户行为研究[C]//第三届学生计算语言学研讨会.沈阳:[出版者不详],2006.
  • 4JUN S, AHAMAD M, XU J. Robust information dissemination in uncooperative environments, distributed computing systems[A]. Proceedings 25th IEEE International Conference, ICDCS 2005[C]. 2005.
  • 5SARWAR B, KARYPIS G,KONSTAN J, et al. Item-based collaborative filtering recommendation algorithms[A]. Proceedings of the 10th International Conference on World Wide Web[C]. 2001.285-295.
  • 6SARWAR B M, KARYPIS G, KONSTAN J A, et al. Application of dimensionality reduction in recommender system: a case study[A]. ACM Web KDD 2000 Workshop[C]. 2000.
  • 7AGGARWAL C C. On the effects of dimensionality reduction on high dimensional similarity search[A]. ACM PODS Conference[C]. 2001.
  • 8STOICA I, MORRIS R, KARGER D, et al.Chord: a scalable peer-to-peer lookup service for internet applications[A]. Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications[C]. 2001. 149-160.
  • 9MIT, P2Psim[EB/OL]. http://pdos.csail.mit.edu/p2psim/, 2005.
  • 10eMule[EB/OL], http://www.emule-project.net/.

共引文献32

同被引文献21

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部