Abstract
It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario the attackers collude to give negative feedback on the victim in order to lower or destroy its reputation. This attack is known as bad mouthing attack, and it can significantly deteriorate the performances of the network. The existing solutions for coping with bad mouthing are mainly concentrated on prevention techniques. In this work we propose a solution that detects and isolates the above mentioned attackers, impeding them in this way to further spread their malicious activity. The approach is based on detecting outliers using clustering, in this case self-organizing maps. An important advantage of this approach is that we have no restrictions on training data, and thus there is no need for any data pre-processing. Testing results demonstrates the capability of the approach in detecting bad mouthing attack in various scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Moya, J.M., Araujo, A., Bankovic, Z., de Goyeneche, J.M., Vallejo, J.C., Malagon, P., Villanueva, D., Fraga, D., Romero, E., Blesa, J.: Improving security for SCADA sensor networks with reputation systems and Self-Organizing maps. Sensors 9, 9380–9397 (2009)
Boukerch, A., Xu, L., EL-Khatib, K.: Trust-based Security for Wireless Ad Hoc and Sensor Networks. Comput. Commun. 30, 2413–2427 (2007)
Papaioannou, T.G., Stamoulis, G.D.: Effective use of reputation of peer-to-peer environments. In: Proceedings of IEEE/ACM CCGRID 2004, GP2PC Workshop, April 19-22, pp. 259–268. IEEE Comp. Soc., Chicago (2004)
Antoniadis, P., Courcoubetis, C., Efstathiou, E., Polyzos, G., Strulo, B.: Peer-to-Peer wireless LAN consortia: Economic modeling and architecture. In: 3rd IEEE International Conference on Peer-to-Peer Computing, pp. 198–199. IEEE Comp. Soc., Los Alamitos (2003)
Lou, J.-K., Chen, K.-T., Lei, C.-L.: A collusion-resistant automation scheme for social moderation systems. In: 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 571–575. IEEE Press, Piscataway (2009)
Bar El, H.: Introduction to Side Channel Attacks. White Paper. Discretix Technologies Ltd. (2003)
Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: 2nd ACM Conference on Electronic Commerce, pp. 150–157. ACM, New York (2000)
Liu, S., Miao, C., Theng, Y.-L., Kot, A.C.: A clustering approach to filtering unfair testimonies for reputation systems (Extended Abstract). In: van der Hoek, Kaminka, L., Luck., Sen (eds.) Int. Conf. on Autonomous Agents and Multiagent Systems, pp. 1577–1578 (2010)
Lou, J.-K., Chen, K.-T., Lei, C.-L.: A collusion-resistant automation scheme for social moderation systems. In: 6th IEEE Conference on Consumer Communications and Networking Conference, pp. 571–575. IEEE Press, Piscataway (2009)
Rieck, K., Laskov, P.: Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 9, 23–48
Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: Best practices. Comput. Commun. (2010)
Haykin, S.: Neural networks - A comprehensive foundation, 2nd edn. Prentice-Hall, Englewood Cliffs (1999)
Fritzke, B.: A Growing Neural Gas Network Learns Topologies. In: Tesauro, G., Touretzky, D.S., Leen, T.K. (eds.) Advances in Neural Information Processing Systems, vol. 7, pp. 625–632. MIT Press, Cambridge (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Banković, Z., Vallejo, J.C., Fraga, D., Moya, J.M. (2011). Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps. In: Herrero, Á., Corchado, E. (eds) Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, vol 6694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21323-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-21323-6_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21322-9
Online ISBN: 978-3-642-21323-6
eBook Packages: Computer ScienceComputer Science (R0)