|
|
Hierarchical classification method of trust networks based on nodes importance |
GONG Weihua1, GUO Weipeng1, PEI Xiaobing2,YANG Lianghuai1 |
1.School of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023,China; 2. School of Software Engineering, Huazhong University of Science and Technology, Wuhan 430074, China |
|
|
Abstract A hierarchical classification method for trust network nodes was proposed based on the network structural features, aiming at the serious problems of malicious attacks and defense mechanisms suffered by the trust networks presently. From the view of relevant relations existing in different nodes of trust network, this method was used to analyze and evaluate the trust values and the power of influences in different trust paths. The key trust sequences were mined with these two factors considered. According to the extents of importance ranking measured by correlations, all nodes in trust network were divided into four groups: core nodes, important nodes, associated nodes and others. This method could completely overcome the shortcomings of the traditional evaluation index of node importance, and exactly reflect the node importance levels and the correlations between nodes. The experimental results show that the proposed method can effectively detect and discover the structural fluctuations of trust network influenced by malicious attacks.
|
Published: 15 October 2015
|
|
针对信任网络目前面临的严峻的恶意攻击和安全防御问题,提出基于网络结构特性的信任网络节点层次化划分方法.从网络节点间的关联关系出发,分析和评价不同信任路径的信任值及其传播影响力.结合考虑这2种因素挖掘出关键信任序列,按照节点重要性依次将信任网络层次化划分成4类节点:核心节点、重要节点、关联节点和无关节点.该方法能够克服传统节点重要性评估指标的缺陷,准确体现网络中信任节点的重要性和关联性.实验结果表明:采用提出的划分方法能够有效地检测和发现恶意攻击对信任网络结构特性的影响.
|
|
[1] AUDUN J, ROSS H, POPE S. Trust network analysis with subjective logic [C] ∥ Proceedings of the 29th Australasian Computer Science Conference (ACSC 2006). Hobart: Australian Computer Society, 2006: 85-94.
[2] KIM Y A, SONG H S. Strategies for predicting local trust based on trust propagation in social networks [J]. Knowledge Based Systems, 2011, 24(8): 1360-1371.
[3] VERBIEST N, CORNELIS C, VICTOR P, et al. Trust and distrust aggregation enhanced with path length incorporation [J]. Fuzzy Sets and Systems, 2012, 202: 61-74.
[4] SEPANDAR D K, MARIO T S, HECTOR G. The Eigentrust algorithm for reputation management in P2P networks [C] ∥ Proceedings of the 12th International Conference on World Wide Web (WWW’03). New York: ACM, 2003: 640-651.
[5] XIONG L, LIU L. PeerTrust: supporting reputation based trust for peer to peer electronic communities [J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7): 843-857.
[6] 田春岐,江建慧,胡治国,等. 一种基于聚集超级节点的P2P网络信任模型[J].计算机学报,2010, 33(2): 345-355.
TIAN Chunqi,JIANG Jianhui,HU Zhiguo, et al. A novel superpeer based trust model for peertopeer networks [J]. Chinese Journal of Computers, 2010,33(2): 345-355.
[7] 冯景瑜,张玉清,陈深龙,等. P2P声誉系统中GoodRep攻击及其防御机制[J].计算机研究与发展, 2011, 48(8): 1473-1480.
FENG Jing yu, ZHANG Yu qing, CHEN Shenlong, et al. GoodRep attack and defense in P2P reputation systems [J]. Journal of Computer Research and Development,2011,48(8): 1473-1480.
[8] 王海艳,杨文彬,王随昌,等. 基于可信联盟的服务推荐方法[J].计算机学报,2014,37(2):301-311.
WANG Hai yan, YANG Wen bin, WANG Sui chang,et al. A service recommendation method based on trustworthy community [J]. Chinese Journal of Computers, 2014, 37(2): 301-311.
[9] 窦文,王怀民,贾焰,等. 构造基于推荐的 PeertoPeer 环境下的 Trust 模型[J]. 软件学报, 2004, 15(4): 571-583.
DOU Wen, WANG Huaimin, JIA Yan, et al. A recommendationbased peertopeer trust model [J]. Journal of Software, 2004, 15(4): 571-583.
[10] WANG Y, NAKAO A, VASILAKOS A V. Doubleface: robust reputation ranking based on link analysis in P2P networks [J]. Cybernetics and Systems, 2010, 41(2): 167-189.
[11] CAVERLEE J, LIU L, WEBB S. The SocialTrust framework for trusted social information management: architecture and algorithms J]. Information Sciences, 2010, 180(1): 95-112.
[12] KOOHBORFARDHAGHIGHI S, KIM J. Using structural information for distributed recommendation in a social network [J]. Applied Intelligence, 2013, 38(2): 255-266.
[13] ZHANG X, LIANG W, ZHU S, et al. Automatic seed set expansion for trust propagation based antispam algorithms [J]. Information Sciences, 2013, 232(20): 167-187.
[14] JIN Y, GU Z, BAN Z. Restraining false feedbacks in peertopeer reputation systems [C] ∥ Proceedings of International Conference on Semantic Computing (ICSC’07). Irvine:IEEE, 2007, 304-312.
[15] CHEN D, LU L, SHANG M, et al. Identifying influential nodes in complex networks [J]. Physica A: Statistical Mechanics and its Applications, 2012,391(4): 1777-1787.
[16] BRIN S, PAGE L. The anatomy of a largescale hypertextual web search engine [J]. Computer Networks and ISDN Systems, 1998, 30(1): 107-117.
[17] KLEINBERG J M. Authoritative sources in a hyperlinked environment [J]. Journal of the ACM (JACM), 1999, 46(5): 604-632.
[18] KITSAK M, GALLOS L K, HAVLIN S, et al. Identification of influential spreaders in complex networks [J]. Nature Physics, 2010, 6(11): 888-893.
[19] LIU J G, REN Z M, GUO Q. Ranking the spreading influence in complex networks [J]. Physica A: Statistical Mechanics and its Applications, 2013, 392(18): 4154-4159.
[20] 赵佳,喻莉,李静茹.社交网络中基于贝叶斯和半环代数模型的节点影响力计算机理[J]. 物理学报, 2013, 62(13): 1-7.
ZHAO Jia, YU Li, LI Jing ru. Node influence calculation mechanism based on bayesian and semiring algebraic model in social networks[J]. Acta Physica Sinica, 2013, 62(13): 1-7.
[21] 张玥,张宏莉,张伟哲,等.识别网络论坛中有影响力用户[J].计算机研究与发展,2013, 50(10): 2195-2205.
ZHANG Yue, ZHANG Hong li, ZHANG Weizhe, et al. Identifying the influential users in network forum [J]. Journal of Computer Research and Development, 2013, 50(10): 2195-2205.
[22] ROMSAIYUD W, PREMCHAISWADI W. Applying mining fuzzy sequential patterns technique to predict the leadership in social networks [C] ∥ Proceedings of 9th International Conference on ICT and Knowledge Engineering. Bangkok: IEEE, 2012: 134-137. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|