Impact of Sybil attacks on Web services trust assessment

被引:0
|
作者
Saoud, Zohra [1 ]
Faci, Noura [1 ]
Maamar, Zakaria [2 ]
Benslimane, Djamal [1 ]
机构
[1] Univ Lyon 1, Villeurbanne, France
[2] Zayed Univ, Dubai, U Arab Emirates
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses how Sybil attacks can undermine trust management systems and how to respond to these attacks using advanced techniques such as credibility and probabilistic databases. In such attacks end-users have purposely different identities and hence, can provide inconsistent ratings over the same Web Services. Many existing approaches rely on arbitrary choices to filter out Sybil users and reduce their attack capabilities. However this turns out inefficient. Our approach relies on non-Sybil credible users who provide consistent ratings over Web services and hence, can be trusted. To establish these ratings and debunk Sybil users techniques such as fuzzy-clustering, graph search, and probabilistic databases are adopted. A series of experiments are carried out to demonstrate robustness of our trust approach in presence of Sybil attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Using corporate firewalls for web services trust
    Melzer, I
    Jeckle, M
    WEB SERVICES -ICWS-EUROPE 2003, PROCEEDINGS, 2003, 2853 : 79 - 87
  • [42] A Strategic Model of Trust Management in Web Services
    Sun, Junqing
    Sun, Zhaohao
    Li, Yuanzhe
    Zhao, Shuliang
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT B, 2012, 24 : 1560 - 1566
  • [43] A method to calculate recommendation trust of web services
    Liu, Wei
    Du, Yu-Yue
    Yan, Chun
    Sha, Jing
    Journal of Software Engineering, 2014, 8 (02): : 108 - 115
  • [44] Helpful Behavior Based on Trust for Web Services
    Letia, Ioan Alfred
    Slavescu, Radu Razvan
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 526 - 533
  • [45] Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System
    Chang, Shih-Hao
    Chen, Zhi-Rong
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [46] Sybil Attacks and Their Defenses in the Internet of Things
    Zhang, Kuan
    Liang, Xiaohui
    Lu, Rongxing
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 372 - 383
  • [47] A Survey of Techniques to Prevent Sybil Attacks
    John, RincyMedayil
    Cherian, Jacob P.
    Kizhakkethottam, Jubilant J.
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORKS SECURITY (ICSNS 2015), 2015,
  • [48] Trust Factors of Social Engineering Attacks on Social Networking Services
    Kano, Yuki
    Nakajima, Tatsuo
    2021 IEEE 3RD GLOBAL CONFERENCE ON LIFE SCIENCES AND TECHNOLOGIES (IEEE LIFETECH 2021), 2021, : 25 - 28
  • [49] The impact of trust on Web purchase intention
    Chen, Mei-Fang
    Tang, Yingchan Edwin
    Kau, Ah Keng
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES, 2004, 3 : 126 - 134
  • [50] Countering DDoS and XDoS Attacks against Web Services
    Ye, Xinfeng
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 1, MAIN CONFERENCE, 2008, : 346 - 352