Please wait a minute...
浙江大学学报(工学版)
计算机技术、信息电子     
信任网络中基于节点重要性的层次化划分方法
龚卫华1 , 郭伟鹏1 , 裴小兵2 , 杨良怀1
1. 浙江工业大学 计算机学院,浙江 杭州 310023; 2.华中科技大学 软件学院,湖北 武汉 430074
Hierarchical classification method of trust networks based on nodes importance
GONG Weihua1, GUO Weipeng1, PEI Xiaobing2,YANG Lianghuai1
1.School of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023,China; 2. School of Software Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
 全文: PDF(1628 KB)   HTML
摘要:
针对信任网络目前面临的严峻的恶意攻击和安全防御问题,提出基于网络结构特性的信任网络节点层次化划分方法.从网络节点间的关联关系出发,分析和评价不同信任路径的信任值及其传播影响力.结合考虑这2种因素挖掘出关键信任序列,按照节点重要性依次将信任网络层次化划分成4类节点:核心节点、重要节点、关联节点和无关节点.该方法能够克服传统节点重要性评估指标的缺陷,准确体现网络中信任节点的重要性和关联性.实验结果表明:采用提出的划分方法能够有效地检测和发现恶意攻击对信任网络结构特性的影响.
Abstract:
A hierarchical classification method for trust network nodes was proposed based on the network structural features, aiming at the serious problems of malicious attacks and defense mechanisms suffered by the trust networks presently. From the view of relevant relations existing in different nodes of trust network, this method was used to analyze and evaluate the trust values and the power of influences in different trust paths. The key trust sequences were mined with these two factors considered. According to the extents of importance ranking measured by correlations, all nodes in trust network were divided into four groups: core nodes, important nodes, associated nodes and others. This method could completely overcome the shortcomings of the traditional evaluation index of node importance, and exactly reflect the node importance levels and the correlations between nodes. The experimental results show that the proposed method can effectively detect and discover the structural fluctuations of trust network influenced by malicious attacks.
出版日期: 2015-10-15
:  TP 391  
基金资助:
浙江省自然科学基金资助项目(LY13F020026, Y1080102,
LY14F020017, LQ15F020007);国家自然科学基金资助项目(61070042)
作者简介: 龚卫华(1977-),男,副教授,博士,从事社交网络、数据挖掘研究.ORCID:0000000162720976.Email:whgong@sohu.com
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  

引用本文:

龚卫华, 郭伟鹏, 裴小兵, 杨良怀.

信任网络中基于节点重要性的层次化划分方法
[J]. 浙江大学学报(工学版), 10.3785/j.issn.1008973X.2015.09.001.

GONG Wei hua, GUO Wei peng, PEI Xiao bing,YANG Liang huai. Hierarchical classification method of trust networks based on nodes importance. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 10.3785/j.issn.1008973X.2015.09.001.

链接本文:

http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008973X.2015.09.001        http://www.zjujournals.com/eng/CN/Y2015/V49/I9/1609

[1] AUDUN J, ROSS H, POPE S. Trust network analysis with subjective logic [C] ∥ Proceedings of the 29th Australasian Computer Science Conference (ACSC 2006). Hobart: Australian Computer Society, 2006: 85-94.
[2] KIM Y A, SONG H S. Strategies for predicting local trust based on trust propagation in social networks [J]. Knowledge Based Systems, 2011, 24(8): 1360-1371.
[3] VERBIEST N, CORNELIS C, VICTOR P, et al. Trust and distrust aggregation enhanced with path length incorporation [J]. Fuzzy Sets and Systems, 2012, 202: 61-74.
[4] SEPANDAR D K, MARIO T S, HECTOR G. The Eigentrust algorithm for reputation management in P2P networks [C] ∥ Proceedings of the 12th International Conference on World Wide Web (WWW’03). New York: ACM, 2003: 640-651.
[5] XIONG L, LIU L. PeerTrust: supporting reputation based trust for peer to peer electronic communities [J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7): 843-857.
[6] 田春岐,江建慧,胡治国,等. 一种基于聚集超级节点的P2P网络信任模型[J].计算机学报,2010, 33(2): 345-355.
TIAN Chunqi,JIANG Jianhui,HU Zhiguo, et al. A novel superpeer based trust model for peertopeer networks [J]. Chinese Journal of Computers, 2010,33(2): 345-355.
[7] 冯景瑜,张玉清,陈深龙,等. P2P声誉系统中GoodRep攻击及其防御机制[J].计算机研究与发展, 2011, 48(8): 1473-1480.
FENG Jing yu, ZHANG Yu qing, CHEN Shenlong, et al. GoodRep attack and defense in P2P reputation systems [J]. Journal of Computer Research and Development,2011,48(8): 1473-1480.
[8] 王海艳,杨文彬,王随昌,等. 基于可信联盟的服务推荐方法[J].计算机学报,2014,37(2):301-311.
WANG Hai yan, YANG Wen bin, WANG Sui chang,et al. A service recommendation method based on trustworthy community [J]. Chinese Journal of Computers, 2014, 37(2): 301-311.
[9] 窦文,王怀民,贾焰,等. 构造基于推荐的 PeertoPeer 环境下的 Trust 模型[J]. 软件学报, 2004, 15(4): 571-583.
DOU Wen, WANG Huaimin, JIA Yan, et al. A recommendationbased peertopeer trust model [J]. Journal of Software, 2004, 15(4): 571-583.
[10] WANG Y, NAKAO A, VASILAKOS A V. Doubleface: robust reputation ranking based on link analysis in P2P networks [J]. Cybernetics and Systems, 2010, 41(2): 167-189.
[11] CAVERLEE J, LIU L, WEBB S. The SocialTrust framework for trusted social information management: architecture and algorithms J]. Information Sciences, 2010, 180(1): 95-112.
[12] KOOHBORFARDHAGHIGHI S, KIM J. Using structural information for distributed recommendation in a social network [J]. Applied Intelligence, 2013, 38(2): 255-266.
[13] ZHANG X, LIANG W, ZHU S, et al. Automatic seed set expansion for trust propagation based antispam algorithms [J]. Information Sciences, 2013, 232(20): 167-187.
[14] JIN Y, GU Z, BAN Z. Restraining false feedbacks in peertopeer reputation systems [C] ∥ Proceedings of International Conference on Semantic Computing (ICSC’07). Irvine:IEEE, 2007, 304-312.
[15] CHEN D, LU L, SHANG M, et al. Identifying influential nodes in complex networks [J]. Physica A: Statistical Mechanics and its Applications, 2012,391(4): 1777-1787.
[16] BRIN S, PAGE L. The anatomy of a largescale hypertextual web search engine [J]. Computer Networks and ISDN Systems, 1998, 30(1): 107-117.
[17] KLEINBERG J M. Authoritative sources in a hyperlinked environment [J]. Journal of the ACM (JACM), 1999, 46(5): 604-632.
[18] KITSAK M, GALLOS L K, HAVLIN S, et al. Identification of influential spreaders in complex networks [J]. Nature Physics, 2010, 6(11): 888-893.
[19] LIU J G, REN Z M, GUO Q. Ranking the spreading influence in complex networks [J]. Physica A: Statistical Mechanics and its Applications, 2013, 392(18): 4154-4159.
[20] 赵佳,喻莉,李静茹.社交网络中基于贝叶斯和半环代数模型的节点影响力计算机理[J]. 物理学报, 2013, 62(13): 1-7.
ZHAO Jia, YU Li, LI Jing ru. Node influence calculation mechanism based on bayesian and semiring algebraic model in social networks[J]. Acta Physica Sinica, 2013, 62(13): 1-7.
[21] 张玥,张宏莉,张伟哲,等.识别网络论坛中有影响力用户[J].计算机研究与发展,2013, 50(10): 2195-2205.
ZHANG Yue, ZHANG Hong li, ZHANG Weizhe, et al. Identifying the influential users in network forum [J]. Journal of Computer Research and Development, 2013, 50(10): 2195-2205.
[22] ROMSAIYUD W, PREMCHAISWADI W. Applying mining fuzzy sequential patterns technique to predict the leadership in social networks [C] ∥ Proceedings of 9th International Conference on ICT and Knowledge Engineering. Bangkok: IEEE, 2012: 134-137.
[1] 何雪军, 王进, 陆国栋, 刘振宇, 陈立, 金晶. 基于三角网切片及碰撞检测的工业机器人三维头像雕刻[J]. 浙江大学学报(工学版), 2017, 51(6): 1104-1110.
[2] 王桦, 韩同阳, 周可. 公安情报中基于关键图谱的群体发现算法[J]. 浙江大学学报(工学版), 2017, 51(6): 1173-1180.
[3] 尤海辉, 马增益, 唐义军, 王月兰, 郑林, 俞钟, 吉澄军. 循环流化床入炉垃圾热值软测量[J]. 浙江大学学报(工学版), 2017, 51(6): 1163-1172.
[4] 毕晓君, 王佳荟. 基于混合学习策略的教与学优化算法[J]. 浙江大学学报(工学版), 2017, 51(5): 1024-1031.
[5] 王亮, 於志文, 郭斌. 基于双层多粒度知识发现的移动轨迹预测模型[J]. 浙江大学学报(工学版), 2017, 51(4): 669-674.
[6] 廖苗, 赵于前, 曾业战, 黄忠朝, 张丙奎, 邹北骥. 基于支持向量机和椭圆拟合的细胞图像自动分割[J]. 浙江大学学报(工学版), 2017, 51(4): 722-728.
[7] 黄正宇, 蒋鑫龙, 刘军发, 陈益强, 谷洋. 基于融合特征的半监督流形约束定位方法[J]. 浙江大学学报(工学版), 2017, 51(4): 655-662.
[8] 蒋鑫龙, 陈益强, 刘军发, 忽丽莎, 沈建飞. 面向自闭症患者社交距离认知的可穿戴系统[J]. 浙江大学学报(工学版), 2017, 51(4): 637-647.
[9] 穆晶晶, 赵昕玥, 何再兴, 张树有. 基于凹凸变换与圆周拟合的重叠气泡轮廓重构[J]. 浙江大学学报(工学版), 2017, 51(4): 714-721.
[10] 戴彩艳, 陈崚, 李斌, 陈伯伦. 复杂网络中的抽样链接预测[J]. 浙江大学学报(工学版), 2017, 51(3): 554-561.
[11] 刘磊, 杨鹏, 刘作军. 采用多核相关向量机的人体步态识别[J]. 浙江大学学报(工学版), 2017, 51(3): 562-571.
[12] 郭梦丽, 达飞鹏, 邓星, 盖绍彦. 基于关键点和局部特征的三维人脸识别[J]. 浙江大学学报(工学版), 2017, 51(3): 584-589.
[13] 王海军, 葛红娟, 张圣燕. 基于核协同表示的快速目标跟踪算法[J]. 浙江大学学报(工学版), 2017, 51(2): 399-407.
[14] 张亚楠, 陈德运, 王莹洁, 刘宇鹏. 基于增量图形模式匹配的动态冷启动推荐方法[J]. 浙江大学学报(工学版), 2017, 51(2): 408-415.
[15] 刘宇鹏, 乔秀明, 赵石磊, 马春光. 统计机器翻译中大规模特征的深度融合[J]. 浙江大学学报(工学版), 2017, 51(1): 46-56.