• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Kang Le, Jing Jiwu, and Wang Yuewu. The Trust Expansion and Control in Social Network Service[J]. Journal of Computer Research and Development, 2010, 47(9): 1611-1621.
Citation: Kang Le, Jing Jiwu, and Wang Yuewu. The Trust Expansion and Control in Social Network Service[J]. Journal of Computer Research and Development, 2010, 47(9): 1611-1621.

The Trust Expansion and Control in Social Network Service

More Information
  • Published Date: September 14, 2010
  • Social network service(SNS) is a new emerging Web application form. With the growth of SNS in application, the trust that plays the role of connecting people brings both good user experience and threats. Trust expansion is not only the means that SNS users construct their online social network with, but also exploited by the attackers to collect victims. Hence, it is desirable to detect the malicious trust expansion behaviors to prevent subsequent attacks. By analyzing the forming process of SNS complex network via a growth model (SNDM), it is discovered that the malicious users are quite possible to adopt some measures to avoid being exposed. This will bring in unavoidable difference in behavior features, so the difference is a weak point that can be exploited to identify the malicious users. In this paper the detailed analysis about the above issue is given, and a practical evaluation-based filter is designed to detect the attackers. Based on the filter a resilient trust control strategy is proposed to restrict and weaken the malicious users, and the normal users will not be bothered. The analysis and conclusions are positively supported by simulation or experiment in a real SNS scenario.
  • Related Articles

    [1]Chen Yewang, Shen Lianlian, Zhong Caiming, Wang Tian, Chen Yi, Du Jixiang. Survey on Density Peak Clustering Algorithm[J]. Journal of Computer Research and Development, 2020, 57(2): 378-394. DOI: 10.7544/issn1000-1239.2020.20190104
    [2]Wang Haiyan, Xiao Yikang. Dynamic Group Discovery Based on Density Peaks Clustering[J]. Journal of Computer Research and Development, 2018, 55(2): 391-399. DOI: 10.7544/issn1000-1239.2018.20160928
    [3]Fan Zhiqiang and Zhao Qinping. A Data-Clustering Based Robust SIFT Feature Matching Method[J]. Journal of Computer Research and Development, 2012, 49(5): 1123-1129.
    [4]Yu Canling, Wang Lizhen, and Zhang Yuanwu. An Enhancement Algorithm of Cluster Boundaries Precision Based on Grid's Density Direction[J]. Journal of Computer Research and Development, 2010, 47(5): 815-823.
    [5]Ma Haitao, Hao Zhongxiao, Zhu Yan. Checking Active XML Validation[J]. Journal of Computer Research and Development, 2008, 45(9): 1554-1560.
    [6]Chen Jianmei, Lu Hu, Song Yuqing, Song Shunlin, Xu Jing, Xie Conghua, Ni Weiwei. A Possibility Fuzzy Clustering Algorithm Based on the Uncertainty Membership[J]. Journal of Computer Research and Development, 2008, 45(9): 1486-1492.
    [7]Lü Zonglei, Wang Jiandong, Li Ying, and Zai Yunfeng. An Index of Cluster Validity Based on Modal Logic[J]. Journal of Computer Research and Development, 2008, 45(9): 1477-1485.
    [8]Jin Jun and Zhang Daoqiang. Semi-Supervised Robust On-Line Clustering Algorithm[J]. Journal of Computer Research and Development, 2008, 45(3): 496-502.
    [9]Ding Shifei, Shi Zhongzhi, Jin Fengxiang, Xia Shixiong. A Direct Clustering Algorithm Based on Generalized Information Distance[J]. Journal of Computer Research and Development, 2007, 44(4): 674-679.
    [10]Yue Shihong, Wang Zhengyou. Bisecting Grid-Based Clustering Approach and Its Validity[J]. Journal of Computer Research and Development, 2005, 42(9): 1505-1510.

Catalog

    Article views (634) PDF downloads (567) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return