Skip to main content

Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps

  • Conference paper
Computational Intelligence in Security for Information Systems

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6694))

Abstract

It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario the attackers collude to give negative feedback on the victim in order to lower or destroy its reputation. This attack is known as bad mouthing attack, and it can significantly deteriorate the performances of the network. The existing solutions for coping with bad mouthing are mainly concentrated on prevention techniques. In this work we propose a solution that detects and isolates the above mentioned attackers, impeding them in this way to further spread their malicious activity. The approach is based on detecting outliers using clustering, in this case self-organizing maps. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrates the capability of the approach in detecting bad mouthing attack in various scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moya, J.M., Araujo, A., Bankovic, Z., de Goyeneche, J.M., Vallejo, J.C., Malagon, P., Villanueva, D., Fraga, D., Romero, E., Blesa, J.: Improving security for SCADA sensor networks with reputation systems and Self-Organizing maps. Sensors 9, 9380–9397 (2009)

    Article  Google Scholar 

  2. Boukerch, A., Xu, L., EL-Khatib, K.: Trust-based Security for Wireless Ad Hoc and Sensor Networks. Comput. Commun. 30, 2413–2427 (2007)

    Article  Google Scholar 

  3. Papaioannou, T.G., Stamoulis, G.D.: Effective use of reputation of peer-to-peer environments. In: Proceedings of IEEE/ACM CCGRID 2004, GP2PC Workshop, April 19-22, pp. 259–268. IEEE Comp. Soc., Chicago (2004)

    Google Scholar 

  4. Antoniadis, P., Courcoubetis, C., Efstathiou, E., Polyzos, G., Strulo, B.: Peer-to-Peer wireless LAN consortia: Economic modeling and architecture. In: 3rd IEEE International Conference on Peer-to-Peer Computing, pp. 198–199. IEEE Comp. Soc., Los Alamitos (2003)

    Google Scholar 

  5. Lou, J.-K., Chen, K.-T., Lei, C.-L.: A collusion-resistant automation scheme for social moderation systems. In: 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 571–575. IEEE Press, Piscataway (2009)

    Google Scholar 

  6. Bar El, H.: Introduction to Side Channel Attacks. White Paper. Discretix Technologies Ltd. (2003)

    Google Scholar 

  7. Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: 2nd ACM Conference on Electronic Commerce, pp. 150–157. ACM, New York (2000)

    Google Scholar 

  8. Liu, S., Miao, C., Theng, Y.-L., Kot, A.C.: A clustering approach to filtering unfair testimonies for reputation systems (Extended Abstract). In: van der Hoek, Kaminka, L., Luck., Sen (eds.) Int. Conf. on Autonomous Agents and Multiagent Systems, pp. 1577–1578 (2010)

    Google Scholar 

  9. Lou, J.-K., Chen, K.-T., Lei, C.-L.: A collusion-resistant automation scheme for social moderation systems. In: 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 571–575. IEEE Press, Piscataway (2009)

    Google Scholar 

  10. Rieck, K., Laskov, P.: Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 9, 23–48

    Google Scholar 

  11. Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: Best practices. Comput. Commun. (2010)

    Google Scholar 

  12. Haykin, S.: Neural networks - A comprehensive foundation, 2nd edn. Prentice-Hall, Englewood Cliffs (1999)

    MATH  Google Scholar 

  13. Fritzke, B.: A Growing Neural Gas Network Learns Topologies. In: Tesauro, G., Touretzky, D.S., Leen, T.K. (eds.) Advances in Neural Information Processing Systems, vol. 7, pp. 625–632. MIT Press, Cambridge (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Banković, Z., Vallejo, J.C., Fraga, D., Moya, J.M. (2011). Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps. In: Herrero, Á., Corchado, E. (eds) Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, vol 6694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21323-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21323-6_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21322-9

  • Online ISBN: 978-3-642-21323-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics