Unlock instant, AI-driven research and patent intelligence for your innovation.

A Fuzzy Detection Method for Collusion Attacks Oriented to Reputation Systems in Social Networks

A technology for social networking and collusion attacks, applied in the field of social networking, to solve problems such as neglect

Active Publication Date: 2018-10-16
SHANGHAI NORMAL UNIVERSITY +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most studies focus on the detection of individual malicious behavior and ignore an important indicator: social relationship

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fuzzy Detection Method for Collusion Attacks Oriented to Reputation Systems in Social Networks
  • A Fuzzy Detection Method for Collusion Attacks Oriented to Reputation Systems in Social Networks
  • A Fuzzy Detection Method for Collusion Attacks Oriented to Reputation Systems in Social Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0066] This application first defines a social network:

[0067] Definition 1

[0068] Social network: The social network is formalized as a bipartite graph, SG=, U={u 1 , u 2 ,...} represents the set of users in the social network, E={e 1 , e 2 ,...} is used to describe the collection of relationships between users.

[0069] user u i It is called a node in the social network model, and the subscript i represents the i-th user; if two different users u i and user u j There exists a line between u i reach u j The directed edge e(u i , u j ), then it indicates that there is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a reputation system-oriented collusion attack fuzzy detection method in a social network. The method comprises following steps of 1), determining reputations of users and the trust relationships among the users; 2), determining whether there is at least one malicious user according to evaluation differences of the users to items; executing a step 3) when there is the malicious user; 3), through taking the obtained malicious user as a detection start point, traversing the users in the social network; and determining whether other users are the collusion attackers of the malicious user or not according to the trust relationships and the reputation similarity levels of the other users and the malicious user. Compared with the prior art, the method has the advantages that the collusion attackers are found out more accurately according to the social relationships, and the detection success rate of the collusion attacks is improved.

Description

technical field [0001] The invention relates to the technical field of social networks, in particular to a fuzzy detection method for reputation system-oriented collusion attacks in social networks. Background technique [0002] Social networking is one of the most popular platforms for people to obtain, share and exchange information. In an open network environment, users are vulnerable to fraud and attacks, and encountering dishonest users and their malicious behavior is inevitable. Therefore, how to prevent users from malicious attacks is a hot spot in current security research. [0003] In order to identify historical reputation and predict the reliability of reputation, reputation system is an indispensable solution to ensure the security of social network. The reputation system can automatically reflect the credibility of users through the reputation indicator. In a reputation-based system, a user with a higher reputation level means more benefits, such as more oppo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/554G06F2221/034
Inventor 张波杨涛宋倩倩李美子潘建国
Owner SHANGHAI NORMAL UNIVERSITY