Conspiring party recognition method based on action analog in P2P network
A P2P network and identification method technology, applied in the field of collusion group identification based on behavioral similarity, to achieve a wide range of applications and improve the effect of resistance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The schematic diagram of the principle of the present invention is as figure 1 As shown, firstly, a trust management node and a behavior recording node are assigned to each node in the network using a secure Hash function, and these two nodes are respectively responsible for managing the trust value of the node and recording the scoring behavior of the node to other nodes; then, by The trust management node monitors other nodes' ratings of the node in real time, especially the nodes with abnormal scoring behavior. If it is found that among the nodes scoring the node, there are more than a certain number of nodes with abnormal behavior, the collusion group detection algorithm will be started to determine whether there is group collusion. If a colluding group is found, use the detection result to recalculate the trust value to remove the interference of the group on the trust value calculation.
[0043] Refer to the flow process of the present invention figure 2 , the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 