• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Feifei and Gui Xiaolin. Research on Dynamic Trust-Level Evaluation Mechanism Based on Machine Learning[J]. Journal of Computer Research and Development, 2007, 44(2): 223-229.
Citation: Chen Feifei and Gui Xiaolin. Research on Dynamic Trust-Level Evaluation Mechanism Based on Machine Learning[J]. Journal of Computer Research and Development, 2007, 44(2): 223-229.

Research on Dynamic Trust-Level Evaluation Mechanism Based on Machine Learning

More Information
  • Published Date: February 14, 2007
  • For the purpose of developing a usable trust relationship between the resource consumers (users) and the resource providers (hosts) in an open computing environment, a dynamic trust evaluation framework based on machine learning is proposed. In this framework, the trust-level of users changes dynamically according to their behaviors and some other common inspect parameters. And the trust-level of resources changes dynamically with the users' assessments and the service quality that resources provide. In this paper, a fuzzy trust-level evaluating algorithm (FTEA) based on fuzzy logic is put forward to generate the evaluation rules and integrated overall trust-level. The FTEA utilizes the rule-based machine learning method and has the advantage of self-learning to get reasoning rules from large amount of input data. The experiment shows that only 1000 groups of data are adequate to generate the reasoning rules, and the execution time of FTEA increases exponentially with the expansion of determination factors, so, an open computing system only need to select 5 to 6 factors or 1000 sample data for implementation.
  • Related Articles

    [1]Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang. Cyber Security Threat Intelligence Sharing Model Based on Blockchain[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    [2]Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming. DiffSec: A Differentiated Intelligent Network Security Service Model[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966. DOI: 10.7544/issn1000-1239.2019.20190019
    [3]Liu Yuling, Feng Dengguo, Lian Yifeng, Chen Kai, Wu Di. Network Situation Prediction Method Based on Spatial-Time Dimension Analysis[J]. Journal of Computer Research and Development, 2014, 51(8): 1681-1694. DOI: 10.7544/issn1000-1239.2014.20121050
    [4]Bu Ning, Liu Yuling, Lian Yifeng, Huang Liang. UML-Based Modeling Method of Network Security Infrastructure[J]. Journal of Computer Research and Development, 2014, 51(7): 1578-1593.
    [5]Wu Yue, Li Jianhua, Lin Chuang. Survey of Security and Trust in Opportunistic Networks[J]. Journal of Computer Research and Development, 2013, 50(2): 278-290.
    [6]Hu Jianli, Zhou Bin, Wu Quanyuan, Li Xiaohua. A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development, 2011, 48(12): 2235-2241.
    [7]Chen Feng, Liu Dehui, Zhang Yi, Su Jishu. A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. Journal of Computer Research and Development, 2011, 48(6): 945-954.
    [8]Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
    [9]Luo Junhai and Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2008, 45(10): 1704-1710.
    [10]Zhang Haixia, Su Purui, and Feng Dengguo. A Network Security Analysis Model Based on the Increase in Attack Ability[J]. Journal of Computer Research and Development, 2007, 44(12): 2012-2019.

Catalog

    Article views (761) PDF downloads (1186) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return