• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yu Yang, Xia Chunhe, Wang Xinghe. A Cloud Model Based Trust Evaluation Model for Defense Agent[J]. Journal of Computer Research and Development, 2015, 52(10): 2178-2191. DOI: 10.7544/issn1000-1239.2015.20150417
Citation: Yu Yang, Xia Chunhe, Wang Xinghe. A Cloud Model Based Trust Evaluation Model for Defense Agent[J]. Journal of Computer Research and Development, 2015, 52(10): 2178-2191. DOI: 10.7544/issn1000-1239.2015.20150417

A Cloud Model Based Trust Evaluation Model for Defense Agent

More Information
  • Published Date: September 30, 2015
  • All defense agents (DAs) are trustworthy and controllable by default during the implementation of defense scheme in the computer network collaborative defense (CNCD) system. But this unreasonable assumption does not hold in the open network environment. Malicious agent will be led into the deployment of CNCD defense scheme and the fail rate of defense schemes will be raised under this assumption, which will decrease the security of the whole system. To address this issue, trust evaluation should be conducted. In the present research work, a trust evaluation model of CNCD is proposed. The model can describe trust from the aspects of randomness and fuzziness, and conduct trust updating. The trust evaluation model includes two key parts: task execution evaluation and defense agent trust updating. Evaluation functions of DAs’ feedback, including functions of finish time (FT) and defense quality (DQ), are studied in detail. Two properties of trust, including time decay and asymmetry, are adopted in the evaluation functions of DAs’ feedback. A sliding time window-based dual weight direct trust cloud model (STBCM) is likewise proposed for trust updating. The contrast experiments show that the proposed algorithm has lower fail rate of defense scheme, and can provide support for the trust deployment of the CNCD scheme.
  • Related Articles

    [1]Wang Hang, Tian Shengzhao, Tang Qing, Chen Duanbing. Few-Shot Image Classification Based on Multi-Scale Label Propagation[J]. Journal of Computer Research and Development, 2022, 59(7): 1486-1495. DOI: 10.7544/issn1000-1239.20210376
    [2]Huang Jipeng, Shi Yinghuan, Gao Yang. Multi-Scale Faster-RCNN Algorithm for Small Object Detection[J]. Journal of Computer Research and Development, 2019, 56(2): 319-327. DOI: 10.7544/issn1000-1239.2019.20170749
    [3]Zheng Wenping, Che Chenhao, Qian Yuhua, Wang Jie. A Two-Stage Community Detection Algorithm Based on Label Propagation[J]. Journal of Computer Research and Development, 2018, 55(9): 1959-1971. DOI: 10.7544/issn1000-1239.2018.20180277
    [4]Xiong Bingyan, Wang Guoyin, Deng Weibin. Under-Sampling Method Based on Sample Weight for Imbalanced Data[J]. Journal of Computer Research and Development, 2016, 53(11): 2613-2622. DOI: 10.7544/issn1000-1239.2016.20150593
    [5]Li Guilin, Yang Yuqi, Gao Xing, and Liao Minghong. Personalized Representation and Rank Algorithm for Enterprise Search Engines[J]. Journal of Computer Research and Development, 2014, 51(1): 206-214.
    [6]She Qiaoqiao, Yu Yang, Jiang Yuan, and Zhou Zhihua. Large-Scale Image Annotation via Random Forest Based Label Propagation[J]. Journal of Computer Research and Development, 2012, 49(11): 2289-2295.
    [7]Ma Qianli, Li Sikun, Zeng Liang. Visualization of Multi-Shock Features for Unstructured-Grid Flows Based on Two-Level Sampling[J]. Journal of Computer Research and Development, 2012, 49(7): 1450-1459.
    [8]Wei Yehua, Li Renfa, Luo Juan, and Chen Honglong. A Localization Algorithm Based on Dynamic Grid Division for Mobile Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(11): 1920-1927.
    [9]Long Jun, Yin Jianping, Zhu En, and Cai Zhiping. An Active Learning Algorithm by Selecting the Most Possibly Wrong-Predicted Instances[J]. Journal of Computer Research and Development, 2008, 45(3): 472-478.
    [10]Chen Yongran, Dou Wenhua, Qian Yue, and Qi Xingyun. Research and Implementation of Parallel Program Profiler Based on System-Sampling[J]. Journal of Computer Research and Development, 2007, 44(10): 1694-1701.
  • Cited by

    Periodical cited type(3)

    1. 潘佳,于秀兰. 基于社交意识和支付激励的D2D协作传输策略. 计算机应用研究. 2023(06): 1801-1805 .
    2. 刘琳岚,谭镇阳,舒坚. 基于图神经网络的机会网络节点重要度评估方法. 计算机研究与发展. 2022(04): 834-851 . 本站查看
    3. 王淳,吴仕荣. 舰船自组织网络数据分发机制研究. 舰船科学技术. 2020(14): 166-168 .

    Other cited types(2)

Catalog

    Article views (1310) PDF downloads (625) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return