Skip to main content
Log in

Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Recently, online rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important but challenging problem. Many unfair rating detection approaches have been developed and evaluated against simple attack models. However, the lack of unfair rating data from real human users and realistic attack behavior models has become an obstacle toward developing reliable rating systems. To solve this problem, we design and launch a rating challenge to collect unfair rating data from real human users. In order to broaden the scope of the data collection, we also develop a comprehensive signal-based unfair rating detection system. Based on the analysis of real attack data, we discover important features in unfair ratings, build attack models, and develop an unfair rating generator. The models and generator developed in this paper can be directly used to test current rating aggregation systems, as well as to assist the design of future rating systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Liang Z, Shi W. Analysis of ratings on trust inference in open environments. Elsevier Performance Evaluation, 2008, 65(2): 99–128.

    Article  Google Scholar 

  2. Whitby A, J¿sang A, Indulska J. Filtering out unfair ratings in Bayesian reputation systems. In Proc. the 7th Int. Workshop on Trust in Agent Societies, New York, USA, July 9–23, 2004, pp.106–117.

  3. Zhang J, Cohen R. Trusting advice from other buyers in e-marketplaces: The problem of unfair ratings. In Proc. the 8th International Conference on Electronic Commerce, New Brunswick, Canada, August 14–16, 2006, pp.225–234.

  4. Zhang Q, Yu T. On the modeling of honest players in reputation systems. In Proc. IEEE ICDCS Workshop on Trust and Reputation Management, Beijing, China, June 17–20, 2008, pp.249–254.

  5. Dellarocas C. Strategic manipulation of Internet opinion forums: Implications for consumers and firms. Management Science, October 2006, 52(10): 1577–1593.

    Article  Google Scholar 

  6. Dellarocas C. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proc. the 2nd ACM Conference on Electronic Commerce, Minneapolis, USA, October 17–20, 2000, pp.150–157.

  7. Chen M, Singh J P. Computing and using reputations for Internet ratings. In Proc. the 3rd ACM Conference on Electronic Commerce, Tampa, USA, Oct. 14{17, 2001, pp.154–162.

  8. Weng J, Miao C, Goh A. An entropy-based approach to protecting rating systems from unfair testimonies. IEICE Transactions on Information and Systems, September 2006, E89-D(9): 2502–2511.

    Article  Google Scholar 

  9. Yang Y, Sun Y, Ren J, Yang Q.e Building trust in online rating systems through signal modeling. In Proc. IEEE ICDCS Workshop on Trust and Reputation Management, Toronto, Canada, June 25–29, 2007.

  10. Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system. In Proc. the Tenth International Conference on Information and Knowledge Management, Atlanta, USA, November 5{10, 2001, pp.310–317.

  11. Vu L-H, Aberer K. A probabilistic framework for decentralized management of trust and quality. In the Eleventh International Workshop on Cooperative Information Agents (CIA 2007), Delft, The Netherlands, September 19–21, 2007, pp.328–342.

  12. Despotovic Z, Aberer K. A probabilistic approach to predict peers' performance in P2P networks. In Proc. Cooperative Information Agents VIII: the 8th International Workshop (CIA 2004), Erfurt, Germany, September 27–29, 2004, pp.62–76.

  13. Whitby A, Jøsang A, Indulska J. Filtering out unfair ratings in Bayesian reputation systems. The Icfain Journal of Management Research, 2005, 4(2): 48–64.

    Google Scholar 

  14. Dellarocas C. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proc. the 2nd ACM Conference on Electronic Commerce, Minneapolis, USA, October 17–20, 2000, pp.150–157.

  15. Despotovic Z, Aberer K. P2P reputation management: Probabilistic estimation vs. social networks. Computer Networks, 2006, 50(4): 485–500.

    Article  MATH  Google Scholar 

  16. Zhou R, Hwang K. Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, May 2007, 18(5): 460–473.

    Article  Google Scholar 

  17. Maheswaran M, Tang H. Towards a gravity-based trust model for social networking systems. In Proc. IEEE ICDCS Workshop on Trust and Reputation Management, Toronto, Canada, June 25–29, 2007.

  18. Wang Y, Vassileva J. A review on trust and reputation for Web service selection. In Proc. IEEE ICDCS Workshop on Trust and Reputation Management, Toronto, Canada, June 25–29, 2007.

  19. Zhao H, Li X. H-trust: A robust and lightweight group reputation system for P2P desktop grid. In Proc. IEEE ICDCS Workshop on Trust and Reputation Management, Beijing, China, June 17–20, 2008, pp.235–240.

  20. Gutowska A, Buckley K. Computing reputation metric in multi-agent e-commerce reputation system. In Proc. IEEE ICDCS Workshop on Trust and Reputation Management, Beijing, China, June 17–20, 2008, pp.255–260.

  21. Wu H, Chen H, Gao C. A trust management model for P2P file sharing system. In Proc. IEEE ICDCS Workshop on Trust and Reputation Management, Beijing, China, June 17–20, 2008, pp.41–44.

  22. Xiong L, Liu L. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, July 2004, 16(7): 843–857.

    Article  Google Scholar 

  23. Fujimura K, Nishihara T. Reputation rating system based on past behavior of evaluators. In Proc. the 4th ACM Conference on Electronic Commerce, San Diego, USA, June 9–12, 2003, pp.246–247.

  24. Netflix prize dataset. www.net°ixprize.com/download.

  25. Etan rating challenge. University of Rhode Island, Aug. 2007, www.etanlab.com/rating.

  26. McKnight D H, Chervany N L. The meanings of trust. MISRCWorking Paper Series, Technical Report 94-04, Arlson School of Management, University of Minnesota, 1996.

  27. Sun Y, Yang Y. Trust establishment in distributed networks: Analysis and modeling. In Proc. IEEE ICC'07, Glasgow, UK, June 24–28, 2007, pp.1266–1273.

  28. Steven M Kay. Fundamentals of Statistical Signal Processing, Volume 2: Detection Theory, Prentice Hall, 1998.

  29. Hayes M Y. Statistical Digital Signal Processing and Modeling. John Wiley and Sons, 1996.

  30. Jøsang A, Ismail R. The beta reputation system. In Proc. the 15th Bled Electronic Commerce Conference, Bled, Slovenia, June 17–19, 2002, pp.324–337.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ya-Fei Yang.

Additional information

This work is partially supported by the NSF of USA under Grant No. 0643532, the National Natural Science Foundation of China under Grant No. 60673183, and the National Research Foundation for the Doctoral Program of Higher Education of China under Grant No. 20060001044.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, YF., Feng, QY., (Lindsay) Sun, Y. et al. Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator. J. Comput. Sci. Technol. 24, 855–867 (2009). https://doi.org/10.1007/s11390-009-9277-5

Download citation

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-009-9277-5

Keywords

Navigation