Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1

Abstract

Over last few years numbers of people are using Internet for Social Networking, Businesses and entertainment. Because users are unknown of third party, it is quiet difficult for users to evaluate honesty and quality of third party. So it is becoming a risky task to perform an online transaction. Large scale research is going on reputation systems. With the fast improvement of reputation systems in different online social networks, exploitations against such frameworks are advancing rapidly. To tackle this problem, a system can be implemented, which secures reputation systems from another point: the combination of time domain anomaly detection and Dempster–Shafer hypothesis based trust calculation. Genuine client assault information gathered from a digital cyber competition is utilized to build the testing data set. Evaluated with two representative reputation plans and existing system, Temporal And Trust Analysis attains an essentially improved performance regarding distinguishing items under attack, discovering malicious clients who embed fraudulent ratings, and improving reputation scores.

Authors and Affiliations

Keywords

Related Articles

Performance Evaluation of Different Protocols under Blackhole and Wormhole Attacks

Mobile Ad hoc Networks (MANETs) refer to mostly wireless - networks where all network components are mobile. In a MANET there is no distinction between a host and a router since all network hosts can be endpoints as well...

The Study of Facial Index among Haryanvi Adults

The present study was conducted in Department of Anatomy, MM institute of medical sciences & research, Mullana (Ambala), on 600 Haryanvi adults comprising of 300 males and 300 females aged 18 to 40 years. Prior informed...

COMPETENT SCHEDULING FOR INTERMITTENT AGGREGATION QUERIES IN MULTIHOP SENSOR NETWORKS

Recent advances in low-power computing and communication technologies have given rise to the proliferation of wireless sensor networks having low cost sensor nodes with limited processing capacity and battery power. Wire...

Genauigkeit Laser Tool for Shafts Alignment

Shaft alignment tool are necessary for alignment of shaft in correct position. Genauigkeit laser tool is the best tool for correct alignment of shaft. This tool enables better precision and accuracy for the correct align...

A Study on Perception and Usefulness of Seed Village Program for Soya Bean Crop among the Beneficiary Farmers of Indore Block of Indore District Madhya Pradesh, India

The word seed or seeds are used for all propagating materials. The seed is considered as most important input in agriculture. It is cheaper than other inputs like irrigation, fertilizer & plant protection measures. Quali...

Download PDF file
  • EP ID EP340064
  • DOI -
  • Views 71
  • Downloads 0

How To Cite

(2015). Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems. UNKNOWN, 4(1), -. https://www.europub.co.uk/articles/-A-340064