2012
DOI: 10.1016/j.cosrev.2012.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy of attacks and defense mechanisms in P2P reputation systems—Lessons for reputation system designers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 58 publications
(40 citation statements)
references
References 56 publications
0
40
0
Order By: Relevance
“…Secondly, false feedback filter is prerequisite to guarantee the correctness of feedback trust. At present, attacks against trust systems emerge endlessly in [15,16]; malicious entities may provide false interaction information about a target entity to the requestor. The existing models only identify and defend simple attacks and fraud but lack protection mechanisms against complex attacks such as collusion, spying, and strategic attacks, which leads to the poor security and robustness.…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, false feedback filter is prerequisite to guarantee the correctness of feedback trust. At present, attacks against trust systems emerge endlessly in [15,16]; malicious entities may provide false interaction information about a target entity to the requestor. The existing models only identify and defend simple attacks and fraud but lack protection mechanisms against complex attacks such as collusion, spying, and strategic attacks, which leads to the poor security and robustness.…”
Section: Introductionmentioning
confidence: 99%
“…Apart from the component repository described before, further important steps toward reusability were made by Hoffman et al [5] and Koutrouli and Tsalgatidou [8]. They conducted surveys on attacks and defense mechanisms and thus helped to collect the ideas for the research community.…”
Section: Research Gapmentioning
confidence: 99%
“…Because of the increasing attention paid to attacks against TRS, several security analyses were carried out in recent years [3,4,6,13]. The resulting proposals of attack taxonomies and formulations of challenges for robust TRS in turn motivated studies on defense strategies (for related surveys see [5] and [8]). As the various trust models are specifically designed to cope with certain attacks, they are not completely robust against various attacks in different settings.…”
Section: Attacks On Trust and Reputation Systemsmentioning
confidence: 99%
“…To cope with the weaknesses of early reputation systems, a large body of work on the design of new trust models and robust metrics has been published (Artz and Gil 2007;Koutrouli and Tsalgatidou 2012;Sun and Liu 2012). While most early computation models could easily be manipulated by malicious actors, current models (particularly those introduced in literature) are quite resistant against a variety of attacks.…”
Section: Exploiting Reputation Systemsmentioning
confidence: 99%
“…In order to give a structured overview of weaknesses, Koutrouli and Tsalgatidou (2012) identified three classes of attacks, namely unfair feedback, inconsistent behavior and identity-based attacks. In unfair feedback attacks, malicious peers provide many unfairly high or low ratings to e.g.…”
Section: Exploiting Reputation Systemsmentioning
confidence: 99%