Reputation system-oriented collusion attack fuzzy detection method in social network

A technology of social network and collusion attack, applied in the field of social network, can solve problems such as ignorance

Active Publication Date: 2016-07-27
SHANGHAI NORMAL UNIVERSITY +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most studies focus on the detection of individual malicious behavior and ignore an important indicator: social relationship

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reputation system-oriented collusion attack fuzzy detection method in social network
  • Reputation system-oriented collusion attack fuzzy detection method in social network
  • Reputation system-oriented collusion attack fuzzy detection method in social network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention will be described in detail below with reference to the drawings and specific embodiments. This embodiment is implemented on the premise of the technical solution of the present invention, and a detailed implementation mode and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0070] This application first defines social networks:

[0071] Definition 1

[0072] Social network: The social network is formalized as a bipartite graph, SG=, U={u 1 ,u 2 ,...} represents the set of users in the social network, E={e 1 ,e 2 ,...} A collection used to describe the relationship between users.

[0073] User u i It is called a node in the social network model, and the subscript i represents the i-th user; if two different users u i And user u j Between u i Reach u j The directed edge e(u i ,u j ), it indicates that there is a user u i To user u j Social relations, user u i Called the i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a reputation system-oriented collusion attack fuzzy detection method in a social network. The method comprises following steps of 1), determining reputations of users and the trust relationships among the users; 2), determining whether there is at least one malicious user according to evaluation differences of the users to items; executing a step 3) when there is the malicious user; 3), through taking the obtained malicious user as a detection start point, traversing the users in the social network; and determining whether other users are the collusion attackers of the malicious user or not according to the trust relationships and the reputation similarity levels of the other users and the malicious user. Compared with the prior art, the method has the advantages that the collusion attackers are found out more accurately according to the social relationships, and the detection success rate of the collusion attacks is improved.

Description

Technical field [0001] The present invention relates to the technical field of social networks, in particular to a method for fuzzy detection of collusion attacks facing reputation systems in social networks. Background technique [0002] Social networks are one of the most popular platforms for people to obtain, share and exchange information. In an open network environment, users are vulnerable to fraud and attacks, and it is inevitable to encounter dishonest users and their malicious behavior. Therefore, how to prevent users from being maliciously attacked is a hot spot in current security research. [0003] In order to identify historical reputation and predict the reliability of reputation, a reputation system is an indispensable solution to ensure the security of social networks. The reputation system can automatically reflect the user's credibility through the indicator of reputation. In a reputation-based system, users with higher reputation levels mean more benefits, su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/554G06F2221/034
Inventor 张波杨涛宋倩倩李美子潘建国
Owner SHANGHAI NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products