Professional Documents
Culture Documents
Securing Online Reputation Systems Through Dempster-Shafer Theory Based Trust Model
Securing Online Reputation Systems Through Dempster-Shafer Theory Based Trust Model
Proposed System:
Based on the anomaly detection results, we further evaluate
users trust values in this section. In most trust models, users
trust values are determined only by their good and bad
behaviors. However, it is not sufficient. Consider two trust
calculation scenarios. First, user A has conducted 5 good
behaviors and 5 bad behaviors. Second, user B is a new
coming user and has no behavior history. In several trust
models [4] [6], both of their trust values will be calculated as
0.5, although we are more confident in user As trust value. To
differentiate these two cases, the concept of behavior
uncertainty is introduced by the Dempster-Shafer theory, to
represent the degree of the ignorance of behavior history. In
this work, we adopt the behavior uncertainty by proposing a
trust model based on the Dempster-Shafer theory.
Advantage:
The proposed detector is used to (a) detect whether
changes occur in the ratings of an item and
Estimate the time when attacks are suspected (i.e. which
rating is suspicious).
Problem Statement:
The analysis of related work has highlighted the lack of
a publicly available benchmark for comparing different
approaches to content based classification of Online trade
Comment short texts. To cope with this lack, we have built and
made available a dataset D of messages taken from Real web
site name xxyy. Lot messages from publicly accessible local
groups have been selected and extracted by means of an
automated procedure that removes undesired Attacker
messages and, for each message, stores the message body and
the name of the group from which it originates. The messages
come from the groups web page section, where any registered
user can post a new message or reply to messages already
posted by other users.
Scope:
Results achieved by the content-based specification
component, on the many level classification, can be considered
good enough and reasonably aligned with those obtained by
well-known information filtering techniques Results obtained
for the content-based specification component on the second
level are slightly less brilliant than those obtained for the first,
but we should interpret this in view of the intrinsic difficulties
in assigning to a message a semantically most specific
category. However, the analysis of the features reported in
Database show that the introduction of contextual information
(CF) significantly improves the ability of the classifier to
correctly distinguish between non-neutral classes. This result
makes more reliable all policies exploiting on-neutral classes,
which are the majority in real-world scenarios.
IMPLEMENTATION
Implementation is the stage of the project when the
theoretical design is turned out into a working system. Thus it can
Modules:
Algorithm
The Dempster-Shafer Theory:
a framework for combining evidence from different sources to
achieve a degree of belief Suppose two events fa; bg are under
consideration, where a = good behavior and b = bad behavior,
System Architecture:
Pentium III
Speed
1.1 Ghz
RAM
256 MB(min)
Hard Disk
- 20 GB
Floppy Drive
1.44 MB
Key Board
Mouse
Monitor
SVGA
:Windows95/98/2000/XP
Front End
: java, jdk1.6
Database
: My sqlserver 2005
Database Connectivity
: JDBC.