Please wait a minute...
JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE)
    
Hierarchical classification method of trust networks based on nodes importance
GONG Weihua1, GUO Weipeng1, PEI Xiaobing2,YANG Lianghuai1
1.School of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023,China; 2. School of Software Engineering, Huazhong University of Science and Technology, Wuhan 430074, China
Download:   PDF(1628KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  
A hierarchical classification method for trust network nodes was proposed based on the network structural features, aiming at the serious problems of malicious attacks and defense mechanisms suffered by the trust networks presently. From the view of relevant relations existing in different nodes of trust network, this method was used to analyze and evaluate the trust values and the power of influences in different trust paths. The key trust sequences were mined with these two factors considered. According to the extents of importance ranking measured by correlations, all nodes in trust network were divided into four groups: core nodes, important nodes, associated nodes and others. This method could completely overcome the shortcomings of the traditional evaluation index of node importance, and exactly reflect the node importance levels and the correlations between nodes. The experimental results show that the proposed method can effectively detect and discover the structural fluctuations of trust network influenced by malicious attacks.


Published: 15 October 2015
CLC:  TP 391  
Cite this article:

GONG Wei hua, GUO Wei peng, PEI Xiao bing,YANG Liang huai. Hierarchical classification method of trust networks based on nodes importance. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2015, 49(9): 1609-1615.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008973X.2015.09.001     OR     http://www.zjujournals.com/eng/Y2015/V49/I9/1609


信任网络中基于节点重要性的层次化划分方法

针对信任网络目前面临的严峻的恶意攻击和安全防御问题,提出基于网络结构特性的信任网络节点层次化划分方法.从网络节点间的关联关系出发,分析和评价不同信任路径的信任值及其传播影响力.结合考虑这2种因素挖掘出关键信任序列,按照节点重要性依次将信任网络层次化划分成4类节点:核心节点、重要节点、关联节点和无关节点.该方法能够克服传统节点重要性评估指标的缺陷,准确体现网络中信任节点的重要性和关联性.实验结果表明:采用提出的划分方法能够有效地检测和发现恶意攻击对信任网络结构特性的影响.
[1] AUDUN J, ROSS H, POPE S. Trust network analysis with subjective logic [C] ∥ Proceedings of the 29th Australasian Computer Science Conference (ACSC 2006). Hobart: Australian Computer Society, 2006: 85-94.
[2] KIM Y A, SONG H S. Strategies for predicting local trust based on trust propagation in social networks [J]. Knowledge Based Systems, 2011, 24(8): 1360-1371.
[3] VERBIEST N, CORNELIS C, VICTOR P, et al. Trust and distrust aggregation enhanced with path length incorporation [J]. Fuzzy Sets and Systems, 2012, 202: 61-74.
[4] SEPANDAR D K, MARIO T S, HECTOR G. The Eigentrust algorithm for reputation management in P2P networks [C] ∥ Proceedings of the 12th International Conference on World Wide Web (WWW’03). New York: ACM, 2003: 640-651.
[5] XIONG L, LIU L. PeerTrust: supporting reputation based trust for peer to peer electronic communities [J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7): 843-857.
[6] 田春岐,江建慧,胡治国,等. 一种基于聚集超级节点的P2P网络信任模型[J].计算机学报,2010, 33(2): 345-355.
TIAN Chunqi,JIANG Jianhui,HU Zhiguo, et al. A novel superpeer based trust model for peertopeer networks [J]. Chinese Journal of Computers, 2010,33(2): 345-355.
[7] 冯景瑜,张玉清,陈深龙,等. P2P声誉系统中GoodRep攻击及其防御机制[J].计算机研究与发展, 2011, 48(8): 1473-1480.
FENG Jing yu, ZHANG Yu qing, CHEN Shenlong, et al. GoodRep attack and defense in P2P reputation systems [J]. Journal of Computer Research and Development,2011,48(8): 1473-1480.
[8] 王海艳,杨文彬,王随昌,等. 基于可信联盟的服务推荐方法[J].计算机学报,2014,37(2):301-311.
WANG Hai yan, YANG Wen bin, WANG Sui chang,et al. A service recommendation method based on trustworthy community [J]. Chinese Journal of Computers, 2014, 37(2): 301-311.
[9] 窦文,王怀民,贾焰,等. 构造基于推荐的 PeertoPeer 环境下的 Trust 模型[J]. 软件学报, 2004, 15(4): 571-583.
DOU Wen, WANG Huaimin, JIA Yan, et al. A recommendationbased peertopeer trust model [J]. Journal of Software, 2004, 15(4): 571-583.
[10] WANG Y, NAKAO A, VASILAKOS A V. Doubleface: robust reputation ranking based on link analysis in P2P networks [J]. Cybernetics and Systems, 2010, 41(2): 167-189.
[11] CAVERLEE J, LIU L, WEBB S. The SocialTrust framework for trusted social information management: architecture and algorithms J]. Information Sciences, 2010, 180(1): 95-112.
[12] KOOHBORFARDHAGHIGHI S, KIM J. Using structural information for distributed recommendation in a social network [J]. Applied Intelligence, 2013, 38(2): 255-266.
[13] ZHANG X, LIANG W, ZHU S, et al. Automatic seed set expansion for trust propagation based antispam algorithms [J]. Information Sciences, 2013, 232(20): 167-187.
[14] JIN Y, GU Z, BAN Z. Restraining false feedbacks in peertopeer reputation systems [C] ∥ Proceedings of International Conference on Semantic Computing (ICSC’07). Irvine:IEEE, 2007, 304-312.
[15] CHEN D, LU L, SHANG M, et al. Identifying influential nodes in complex networks [J]. Physica A: Statistical Mechanics and its Applications, 2012,391(4): 1777-1787.
[16] BRIN S, PAGE L. The anatomy of a largescale hypertextual web search engine [J]. Computer Networks and ISDN Systems, 1998, 30(1): 107-117.
[17] KLEINBERG J M. Authoritative sources in a hyperlinked environment [J]. Journal of the ACM (JACM), 1999, 46(5): 604-632.
[18] KITSAK M, GALLOS L K, HAVLIN S, et al. Identification of influential spreaders in complex networks [J]. Nature Physics, 2010, 6(11): 888-893.
[19] LIU J G, REN Z M, GUO Q. Ranking the spreading influence in complex networks [J]. Physica A: Statistical Mechanics and its Applications, 2013, 392(18): 4154-4159.
[20] 赵佳,喻莉,李静茹.社交网络中基于贝叶斯和半环代数模型的节点影响力计算机理[J]. 物理学报, 2013, 62(13): 1-7.
ZHAO Jia, YU Li, LI Jing ru. Node influence calculation mechanism based on bayesian and semiring algebraic model in social networks[J]. Acta Physica Sinica, 2013, 62(13): 1-7.
[21] 张玥,张宏莉,张伟哲,等.识别网络论坛中有影响力用户[J].计算机研究与发展,2013, 50(10): 2195-2205.
ZHANG Yue, ZHANG Hong li, ZHANG Weizhe, et al. Identifying the influential users in network forum [J]. Journal of Computer Research and Development, 2013, 50(10): 2195-2205.
[22] ROMSAIYUD W, PREMCHAISWADI W. Applying mining fuzzy sequential patterns technique to predict the leadership in social networks [C] ∥ Proceedings of 9th International Conference on ICT and Knowledge Engineering. Bangkok: IEEE, 2012: 134-137.
[1] HE Xue-jun, WANG Jin, LU Guo-dong, LIU Zhen-yu, CHEN Li, JIN Jing. 3D head portrait sculpture by industrial robot based on triangular mesh slicing and collision detection[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1104-1110.
[2] WANG Hua, HAN Tong-yang, ZHOU Ke. KeyGraph-based community detection algorithm for public security intelligence[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1173-1180.
[3] YOU Hai-hui, MA Zeng-yi, TANG Yi-jun, WANG Yue-lan, ZHENG Lin, YU Zhong, JI Cheng-jun. Soft measurement of heating value of burning municipal solid waste for circulating fluidized bed[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1163-1172.
[4] BI Xiao-jun, WANG Jia-hui. Teaching-learning-based optimization algorithm with hybrid learning strategy[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(5): 1024-1031.
[5] WANG Liang, YU Zhi-wen, GUO Bin. Moving trajectory prediction model based on double layer multi-granularity knowledge discovery[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 669-674.
[6] LIAO Miao, ZHAO Yu-qian, ZENG Ye-zhan, HUANG Zhong-chao, ZHANG Bing-kui, ZOU Bei-ji. Automatic segmentation for cell images based on support vector machine and ellipse fitting[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 722-728.
[7] MU Jing-jing, ZHAO Xin-yue, HE Zai-xing, ZHANG Shu-you. Contour reconstruction of overlapped bubbles based on concave-convex transformation and circle fitting[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 714-721.
[8] HUANG Zheng-yu, JIANG Xin-long, LIU Jun-fa, CHEN Yi-qiang, GU Yang. Fusion feature based semi-supervised manifold localization method[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 655-662.
[9] JIANG Xin-long, CHEN Yi-qiang, LIU Jun-fa, HU Li-sha, SHEN Jian-fei. Wearable system to support proximity awareness for people with autism[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 637-647.
[10] DAI Cai-yan, CHEN Ling, LI Bin, CHEN Bo-lun. Sampling-based link prediction in complex networks[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 554-561.
[11] LIU Lei, YANG Peng, LIU Zuo-jun. Locomotion-Mode recognition using multiple kernel relevance vector machine[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 562-571.
[12] GUO Meng-li, DA Fei-peng, DENG Xing, GAI Shao-yan. 3D face recognition based on keypoints and local feature[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 584-589.
[13] WANG Hai jun, GE Hong juan, ZHANG Sheng yan. Fast object tracking algorithm via kernel collaborative presentation[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(2): 399-407.
[14] ZHANG Ya nan, CHEN De yun, WANG Ying jie, LIU Yu peng. Incremental graph pattern matching based dynamic recommendation method for cold-start user[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(2): 408-415.
[15] LIU Yu peng, QIAO Xiu ming, ZHAO Shi lei, MA Chun guang. Deep combination of large-scale features in statistical machine translation[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(1): 46-56.