Skip to main content
Log in

An unsupervised strategy for defending against multifarious reputation attacks

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

In electronic markets, malicious sellers often employ reviewers to carry out different types of attacks to improve their own reputations or destroy their opponents’ reputations. As such attacks may involve deception, collusion, and complex strategies, maintaining the robustness of reputation evaluation systems remains a challenging problem. From a platform manager’s view, no trader can be taken as a trustable benchmark for reference, therefore, accurate filtration of dishonest sellers and fraud reviewers and precise presentation of users’ reputations remains a challenging problem. Based on impression theory, this paper presents an unsupervised strategy, which first design a nearest neighbor search algorithm to select some typical lenient reviewers and strict reviewers. Then, based on these selected reviewers and the behavior expectation theory in impression theory, this paper adopts a classification algorithm that pre-classify sellers into honest and dishonest ones. Thirdly, another classification algorithm is designed to classify reviewers (i.e., buyers) into honest, dishonest, and uncertain ones according to their trading experiences with the pre-classified sellers. Finally, based on the ratings of various reviewers, this paper proposes a formula to estimate seller reputations. We further designed two general sets of experiments over simulated data and real data to evaluate our scheme, which demonstrate that our unsupervised scheme outperforms benchmark strategies in accurately estimating seller reputations. In particular, this strategy can robustly defend against various common attacks and unknown attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Longman Dictionary of Contemporary English (2019) Reputation. http://www.ldoceonline.com/dictionary/reputation

  2. Chiu DKW, Leung HF, Lam KM (2009) On the making of service recommendations: an action theory based on utility, reputation, and risk attitude. Expert Syst Appl 36(2):3293–3301

    Article  Google Scholar 

  3. Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proceedings of the second ACM conference on Electronic Commerce, 150–157

  4. Jøsang A (2012) Robustness of trust and reputation systems: Does it matter? Ifip Advances in Information & Communication Technology 253–262

  5. Zhang L, Jiang S, Zhang J, Ng WK (2012) Robustness of trust models and combinations for handling unfair ratings. Ifip Advances in Information & Communication Technology 36–51

  6. Siwei J, Jie Z, Yew-Soon O (2013) An Evolutionary Model for Constructing Robust Trust Networks. In: Proceedings of the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 813–820

  7. Luca M, Zervas G (2013) Fake it till you make it: reputation, competition, and yelp review fraud. Harvard Business School Working Papers

  8. Mukherjee A, Venkataraman V, Liu B, Glance N (2013) What yelp fake review filter might be doing? In Seventh International AAAI Conference on Weblogs and Social Media

  9. Rayana S, Akoglu L (2015) Collective opinion spam detection: bridging review networks and metadata. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp.985–994). ACM

  10. Liu S, Zhang J, Miao C, Theng Y-L, Kot AC (2014) An integrated clustering based approach to filtering unfair multi-nominal testimonies. Comput Intell 30(2):316–341

    Article  MathSciNet  Google Scholar 

  11. Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Dec Supp Syst 43(2):618–644

    Article  Google Scholar 

  12. Zacharia G, Moukas A, Maes P (2000) Collaborative reputation mechanisms for electronic marketplaces. Hicss 29(4):371–388

    Article  Google Scholar 

  13. Guo H (2009) Modeling for reputation computing in c2c communities. Chinese Journal of Management

  14. Ji S, Liu B, Zou B, Zhang C (2017) An anti-attack model for centralized C2C reputation evaluation agent. IEEE International Conference on Agents (pp.63–69). IEEE

  15. Whitby A, Jøsang A, Indulska J (2004) Filtering out unfair ratings in Bayesian reputation systems. In: Proceedings of International Conference on Autonomous Agents and Multiagent Systems Workshop on Trust in Agent Societies (AAMAS)

  16. Wang X, Ji SJ, Liang YQ, Chiu DKW (2017) An impression-based strategy for defending reputation attacks in multi-agent reputation system. International Symposium on Computational Intelligence and Design (pp.383–388). IEEE

  17. Kerr R, Cohen R (2006) Modeling trust using transactional, numerical units. In Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services (p. 21). ACM

  18. Jøsang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, 324–337

  19. Anderson CA, Sedikides C (1991) Thinking about people: contribution of typological alternative to Associanistic and dimensional models of person perception. J Pers Soc Psychol 60:203–217

  20. Jin SH (2005) Social psychology. Higher Education Press, Beijing, pp 102–109

  21. Xiang SL (2006) Social psychology (2nded.). China. Renmin University Press, Beijing, pp 108–117

  22. Matthews BW (1975) Comparison of the predicted and observed secondary structure of t4 phage lysozyme. Biochim Biophys Acta 405(2):442–451

    Article  Google Scholar 

  23. Hao J, Kang E, Jackson D, Sun J (2014) Adaptive defending strategy for smart grid attacks. The ACM workshop on smart energy grid security, 23–30

  24. Hao J, Xue Y, Chandramohan M, Liu Y, Sun J (2015) An adaptive Markov strategy for effective network intrusion detection. IEEE International Conference on Tools with Artificial Intelligence, 1085–1092

  25. Hao J, Kang E, Sun J, Wang Z, Meng Z, Li X et al (2016) An adaptive Markov strategy for defending smart grid false data injection from malicious attackers. IEEE Trans Smart Grid. https://doi.org/10.1109/TSG.2016.2610582

    Article  Google Scholar 

  26. Zhao Z, Zhang Y, Li C, Ning L, Fan J, Zhao Z et al (2017) A system to manage and mine microblogging data. J Intel Fuzzy Syst 33(1):1–11

    Article  Google Scholar 

  27. Zhao Z, Li C, Zhang Y, Huang JZ, Luo J, Feng S et al (2015) Identifying and analyzing popular phrases multi-dimensionally in social media data. Int J Data Warehous Min 11(3):98–112

    Article  Google Scholar 

Download references

Acknowledgements

This paper is supported in part by the Natural Science Foundation of China (No. 71772107, 71403151, 61502281, 61433012, U1435215), Qingdao social science planning project (No. QDSKL1801138), the training program of the major research plan of the National natural science foundation of China (No. 91746104), the National Key R&D Plan of China (Nos. 2017YFC0804406, 2018YFC0831002), Humanity and Social Science Fund of the Ministry of Education (No. 18YJAZH136), the Key R&D Plan of Shandong Province (No.2018GGX101045), the Natural Science Foundation of Shandong Province (Nos. ZR2018BF013, ZR2013FM023, ZR2014FP011, ZR2019MF003), Shandong Education Quality Improvement Plan for Postgraduate, the Leading talent development program of Shandong University of Science and Technology and Special funding for Taishan scholar construction project and SDUST Research Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shu-juan Ji.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Ji, Sj., Liang, Yq. et al. An unsupervised strategy for defending against multifarious reputation attacks. Appl Intell 49, 4189–4210 (2019). https://doi.org/10.1007/s10489-019-01490-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-019-01490-9

Keywords

Navigation