首页> 外文期刊>Mobile Information Systems >A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective
【24h】

A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective

机译:移动社交网络中声誉聚合的模糊共谋攻击检测机制:基于信任关系的视角

获取原文
获取原文并翻译 | 示例
           

摘要

While the mechanism of reputation aggregation proves to be an effective scheme for indicating an individual's trustworthiness and further identifying malicious ones in mobile social networks, it is vulnerable to collusive attacks from malicious nodes of collaborative frauds. To conquer the challenge of detecting collusive attacks and then identifying colluders for the reputation system in mobile social networks, a fuzzy collusive attack detection mechanism (FCADM) is proposed based on nodes' social relationships, which comprises three parts: trust schedule, malicious node selection, and detection traversing strategy. In the first part, the trust schedule provides the calculation method of interval valued fuzzy social relationships and reputation aggregation for nodes in mobile social networks; further, a set of fuzzy valued factors, that is, item judgment factor, node malicious factor, and node similar factor, is given for evaluating the probability of collusive fraud happening and identifying single malicious nodes in the second part; and moreover, a detection traversing strategy is given based on randomwalk algorithm under the perspectives of fuzzy valued nodes' trust schedules and proposedmalicious factors. Finally, our empirical results and analysis show that the proposed mechanism in this paper is feasible and effective.
机译:尽管信誉聚集机制被证明是一种有效的方案,可以表明个人的可信度并进一步识别移动社交网络中的恶意信誉,但它很容易受到来自协作欺诈的恶意节点的共谋攻击。为了克服在移动社交网络中检测共谋攻击,然后为信誉系统识别共谋者的挑战,提出了一种基于节点的社会关系的模糊共谋攻击检测机制(FCADM),包括信任调度,恶意节点选择三部分。 ,以及检测遍历策略。第一部分,信任调度为移动社交网络中的节点提供了区间值模糊社交关系和信誉聚集的计算方法。此外,第二部分给出了一组模糊值因子,即项目判断因子,节点恶意因子和节点相似因子,以评估共谋欺诈的发生概率并识别单个恶意节点。在模糊值节点的信任调度和恶意因素的考虑下,提出了一种基于随机游走算法的检测遍历策略。最后,我们的实证结果和分析表明,本文提出的机制是可行和有效的。

著录项

  • 来源
    《Mobile Information Systems》 |2016年第1期|5185170.1-5185170.16|共16页
  • 作者单位

    Shanghai Normal Univ, Coll Informat Mech & Elect Engn, Shanghai 200234, Peoples R China;

    Shanghai Normal Univ, Coll Informat Mech & Elect Engn, Shanghai 200234, Peoples R China;

    Minist Publ Secur, Res Inst 3, Shanghai 201204, Peoples R China;

    Anhui Boryou Informat Technol Co Ltd, Hefei 230000, Anhui, Peoples R China;

    Shanghai Normal Univ, Coll Informat Mech & Elect Engn, Shanghai 200234, Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号