ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 1)

Publication Date:

Authors : ; ;

Page : 984-986

Keywords : Reputation systems; Anonymity; Information security; Information filtering;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Over last few years numbers of people are using Internet for Social Networking, Businesses and entertainment. Because users are unknown of third party, it is quiet difficult for users to evaluate honesty and quality of third party. So it is becoming a risky task to perform an online transaction. Large scale research is going on reputation systems. With the fast improvement of reputation systems in different online social networks, exploitations against such frameworks are advancing rapidly. To tackle this problem, a system can be implemented, which secures reputation systems from another point the combination of time domain anomaly detection and DempsterShafer hypothesis based trust calculation. Genuine client assault information gathered from a digital cyber competition is utilized to build the testing data set. Evaluated with two representative reputation plans and existing system, Temporal And Trust Analysis attains an essentially improved performance regarding distinguishing items under attack, discovering malicious clients who embed fraudulent ratings, and improving reputation scores.

Last modified: 2021-06-30 21:20:16