Abstract
Social trust and recommendation services are the most popular social rating systems today for service providers to learn about the social opinion or popularity of a product, item, or service, such as a book on Amazon, a seller on eBay, a story on Digg or a movie on Netflix. Such social rating systems are very convenient and offer alternative learning environments for decision makers, but they open the door for attackers to manipulate the social rating systems by selfishly promoting or maliciously demoting certain items. Although a fair amount of effort has been made to understand various risks and possible defense mechanisms to counter such attacks, most of the existing work to date has been devoted to studying specific types of attacks and their countermeasures. In this article, we argue that vulnerabilities in social rating systems and their countermeasures should be examined and analyzed in a systematic manner. We first give an overview of the common vulnerabilities and attacks observed in some popular social rating services. Next, we describe three types of attack strategies in two types of social rating systems, including a comprehensive theoretical analysis of their attack effectiveness and attack costs. Three context-aware countermeasures are then presented: (i) hiding user-item relationships, (ii) using confidence weight to distinguish popular and unpopular items, and (iii) incorporating time windows in trust establishment. We also provide an in-depth discussion on how these countermeasures can be used effectively to improve the robustness and trustworthiness of the social rating services.
- Adomavicius, G. and Tuzhilin, A. 2005. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. Know. Data Eng. 17, 6, 734--749. Google Scholar
Digital Library
- Amatriain, X., Lathia, N. M., Pujol, J., Kwak, H., and Oliver, N. 2009. The wisdom of the few: A collaborative filtering approach based on expert opinions from the web. In Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM Press, New York, NY, 532--539. Google Scholar
Digital Library
- Badger, D. 2010. Amazon's top reviewers: The bookstore that corrupted hadleyburg. http://www. dancingbadger.com/amareview.htm.Google Scholar
- Brown, J. and Morgan, J. 2006. Reputation in online markets: Some negative feedback. IBER Working Paper, University of California Berkeley, CA.Google Scholar
- Caverlee, J., Liu, L., and Webb, S. 2010. The social trust framework for trusted social information management. Arch. Algorith. Inf. Sci. 180, 1, 95--112. Google Scholar
Digital Library
- Dellarocas, C. 2003. The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Manage. Sci. 49, 10, 1407--1424. Google Scholar
Digital Library
- Douceur, J. R. 2002. The sybil attack. In Proceedings of the International Workshop as Peer-to-Peer Systems. Google Scholar
Digital Library
- Faloutsos, M., Faloutsos, P., and Faloutsos, C. 1999. On power-law relationships of the Internet topology. SIGCOMM Comp. Comm. Rev. 29, 4, 251--262. Google Scholar
Digital Library
- Feng, Q., Sun, Y., Liu, L., Yang, Y., and Dai, Y. 2010. Voting systems with trust mechanisms in cyberspace: Vulnerabilities and defenses. IEEE Trans. Knowl. Data Eng. 1766--1780. Google Scholar
Digital Library
- Feng, Q. 2011. Research on malicious and multi-attribute problems in recommender systems, Ph.D. dissertation.Google Scholar
- Harmon, A. 2004. Report: Glitch IDs anonymous Amazon reviewers. http://web.archive.org/web/2008030905 1211/http://www.cnn.com/2004/TECH/internet/02/14/glitch.reveals.ap/index.html.CNN.com.Google Scholar
- Hines, M. 2007. Scammers gaming YouTube ratings for profit. InfoWorld. http://www.infoworld.com/article/07/05/16/cybercrooks_gaming google_1.html.Google Scholar
- Hoffman, K., Zage, D., and Nita-Rotaru, C. 2007. A survey of attack and defense techniques for reputation systems. Tech. repo. CSD TR # 07-013, Purdue University.Google Scholar
- Josang, A. and Ismail, R. 2002. The beta reputation system. In Proceedings of the 15th Electronic Commerce Conference.Google Scholar
- Kasneci, G., Gael, J. V., Stern, D., and Graepel, T. 2011. CoBayes: Bayesian knowledge corroboration with assessors of unknown areas of expertise. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining. 465--474. Google Scholar
Digital Library
- Kuter, U. and Golbeck, J. 2010. Using probabilistic confidence models for trust inference in Web-based social networks. ACM Trans. Int. Tech. 10, 2, Article 8. Google Scholar
Digital Library
- Lam, S. K. and Riedl, J. 2004. Shilling recommender systems for fun and profit. In Proceedings of the 13th International World Wide Web Conference. 393--402. Google Scholar
Digital Library
- Mobasher, B., Burke, R., Bhaumik, R., and Williams, C. 2007. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Int. Tech. 7, 4, Article 23. Google Scholar
Digital Library
- Parsa, A. 2009. Belkin's development rep is hiring people to write fake positive amazon reviews. http://www.thedailybackground.com/2009/01/16/exclusive-belkins-development-rep-is-hiringpeople-to-write-fake-positive-amazon-reviews/2009.Google Scholar
- Resnick, P. and Varian, H. R. 1997. Recommender systems. Comm. ACM 40, 3, 56--58. Google Scholar
Digital Library
- Resnick, P., Zeckhauser, R., Swansonand, J., and Lockwood, K. 2006. The value of reputation on eBay: A controlled experiment, Experim. Econ. l9, 2, 79--101.Google Scholar
Cross Ref
- Saleh, K. 2008. An interview with Digg top user. http://www.invesp.com/blog/social-media/an-interview-with-digg-top-user.html. Social Media.Google Scholar
- Sciretta, P. 2008. IMDb watch, are dark knight fanboys burying the godfather? http://www.slashfilm.com/2008/07/28/imdb-watch-are-dark-knight-fanboys-burying-the-godfather/.Google Scholar
- Srivatsa, M. and Liu, L. 2006. Securing decentralized reputation management using TrustGuard. J. Parall. Dist. Comp. 66, 9, 1217--1232. Google Scholar
Digital Library
- Stern, D. H., Herbrich, R., and Graepel, T. 2009. Matchbox: Large scale online bayesian recommendations. In Proceedings of the 18th International World Wide Web Conference. 111--120. Google Scholar
Digital Library
- Sun, Y. L., Han, Z., Yu, W., Liu, and K. J. R. 2006. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of IEEE INFOCOM.Google Scholar
Cross Ref
- Taobaozuan. 2010. http://www.taobaozuan.com.Google Scholar
- Tran, N., Min, B., Li, J., and Subramanian, L. 2009. Sybil-resilient online content voting. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, Berkeley, CA, 15--28. Google Scholar
Digital Library
- Von Ahn, L., Maurer, B., McMillen, C., Abraham, D., and Blum, M. 2008. reCAPTCHA: Human-based character Recognition via web security measures. Science, 321, 5895, 1465--1468.Google Scholar
- Vu, L., Papaioannou, T., and Aberer, K. 2010. Impact of trust management and information sharing to adversarial cost in ranking systems. In IFIP Advances in Information and Communication Technology, Trust Management IV, 321, 108--124.Google Scholar
- Walter, F. E., Battiston, S., and Schweitzer, F. 2009. Personalized and dynamic trust in social networks. In Proceedings of the 3rd ACM Conference on Recommender Systems. ACM Press, New York, NY, 197--204. Google Scholar
Digital Library
- Xiong, L. and Liu, L. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities, IEEE Trans. Knowl. Data Eng. 16, 7, 843--857. Google Scholar
Digital Library
- Yang, Y., Feng, Q., Sun, Y., and Dai, Y. 2009. Dishonest behaviors in online rating systems: Cyber competition, attack models, and attack generator. J. Comp. Sci. Tech. 24, 5, 855--867. Google Scholar
Digital Library
- Yu, H., Kaminsky, M., Gibbons, P. B., and Flaxman, A. 2006. SybilGuard: Defending against sybil attacks via social networks. SIGCOMM Comp. Comm. Rev. 36, 4, 267--278. Google Scholar
Digital Library
- Zarrella, D. 2009. Not everything that can be counted counts. http://pistachioconsulting.com/shortyawards-gaming/.Google Scholar
Recommendations
Item Reputation-Aware Recommender Systems
iiWAS '14: Proceedings of the 16th International Conference on Information Integration and Web-based Applications & ServicesRecommender systems provide personalized advice for online customers based on their own preferences, while reputation systems generate a community advice on the quality of items on the Web. Both systems employ users' ratings to generate their output. In ...
Discovering Users' Perceptions on Rating Visualizations
CHIuXiD '16: Proceedings of the 2nd International Conference in HCI and UX Indonesia 2016Nowadays, the majority of commercial website reviews present customers' ratings visually including thumbs up/down, unary rating, 5-star rating, a 10-point system and a 100-point system. Among these visuals, the 5-star is the most popular rating system. ...
Service Objective Evaluation via Exploring Social Users' Rating Behaviors
BIGMM '15: Proceedings of the 2015 IEEE International Conference on Multimedia Big DataWith the boom of e-commerce, it is a very popular trend for people to share their consumption experience and rate the items on a review site. The information they shared is valuable for new users to judge whether the items have high-quality services. ...






Comments