A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems

2021 ◽  
Vol 37 (1-4) ◽  
pp. 1-30
Author(s):  
Vincenzo Agate ◽  
Alessandra De Paola ◽  
Giuseppe Lo Re ◽  
Marco Morana

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent on disseminating false reputation values. Given the variety of application scenarios in which RMSs can be adopted, as well as the multitude of behaviours that agents can implement, designers need RMS evaluation tools that allow them to predict the robustness of the system to security attacks, before its actual deployment. To this aim, we present a simulation software for the vulnerability evaluation of RMSs and illustrate three case studies in which this tool was effectively used to model and assess state-of-the-art RMSs.

Author(s):  
Vincenzo Agate ◽  
Alessandra De Paola ◽  
Giuseppe Lo Re ◽  
Marco Morana

Distributed environments consist of a huge number of entities that cooperate to achieve complex goals. When interactions occur between unknown parties, intelligent techniques for estimating agent reputations are required. Reputation management systems (RMS's) allow agents to perform such estimation in a cooperative way. In particular, distributed RMS's exploit feedbacks provided after each interaction and allow prediction of future behaviors of agents. Such systems, in contrast to centralized RMSs, are sensitive to fake information injected by malicious users; thus, predicting the performance of a distributed RMS is a very challenging task. Although many existing works have addressed some challenges concerning the design and assessment of specific RMS's, there are no simulation environments that adopt a general approach that can be applied to different application scenarios. To overcome this lack, we present DRESS, an agent-based simulation framework that aims to support researchers in the evaluation of distributed RMSs under different security attacks.


2020 ◽  
Vol 8 (1) ◽  
pp. 33-41
Author(s):  
Dr. S. Sarika ◽  

Phishing is a malicious and deliberate act of sending counterfeit messages or mimicking a webpage. The goal is either to steal sensitive credentials like login information and credit card details or to install malware on a victim’s machine. Browser-based cyber threats have become one of the biggest concerns in networked architectures. The most prolific form of browser attack is tabnabbing which happens in inactive browser tabs. In a tabnabbing attack, a fake page disguises itself as a genuine page to steal data. This paper presents a multi agent based tabnabbing detection technique. The method detects heuristic changes in a webpage when a tabnabbing attack happens and give a warning to the user. Experimental results show that the method performs better when compared with state of the art tabnabbing detection techniques.


2022 ◽  
Vol 22 (1) ◽  
pp. 1-31
Author(s):  
Marwa Daaji ◽  
Ali Ouni ◽  
Mohamed Mohsen Gammoudi ◽  
Salah Bouktif ◽  
Mohamed Wiem Mkaouer

Web service composition allows developers to create applications via reusing available services that are interoperable to each other. The process of selecting relevant Web services for a composite service satisfying the developer requirements is commonly acknowledged to be hard and challenging, especially with the exponentially increasing number of available Web services on the Internet. The majority of existing approaches on Web Services Selection are merely based on the Quality of Service (QoS) as a basic criterion to guide the selection process. However, existing approaches tend to ignore the service design quality, which plays a crucial role in discovering, understanding, and reusing service functionalities. Indeed, poorly designed Web service interfaces result in service anti-patterns, which are symptoms of bad design and implementation practices. The existence of anti-pattern instances in Web service interfaces typically complicates their reuse in real-world service-based systems and may lead to several maintenance and evolution problems. To address this issue, we introduce a new approach based on the Multi-Objective and Optimization on the basis of Ratio Analysis method (MOORA) as a multi-criteria decision making (MCDM) method to select Web services based on a combination of their (1) QoS attributes and (2) QoS design. The proposed approach aims to help developers to maintain the soundness and quality of their service composite development processes. We conduct a quantitative and qualitative empirical study to evaluate our approach on a Quality of Web Service dataset. We compare our MOORA-based approach against four commonly used MCDM methods as well as a recent state-of-the-art Web service selection approach. The obtained results show that our approach outperforms state-of-the-art approaches by significantly improving the service selection quality of top- k selected services while providing the best trade-off between both service design quality and desired QoS values. Furthermore, we conducted a qualitative evaluation with developers. The obtained results provide evidence that our approach generates a good trade-off for what developers need regarding both QoS and quality of design. Our selection approach was evaluated as “relevant” from developers point of view, in improving the service selection task with an average score of 3.93, compared to an average of 2.62 for the traditional QoS-based approach.


Author(s):  
Salama A. Mostafa ◽  
Alicia Y.C. Tang ◽  
Mustafa Hamid Hassan ◽  
Mohammed Ahmed Jubair ◽  
Shihab Hamad Khaleefah

Author(s):  
Muhammad Salman Raheel ◽  
Raad Raad

This chapter discusses the state of the art in dealing with the resource optimization problem for smooth delivery of video across a peer to peer (P2P) network. It further discusses the properties of using different video coding techniques such as Scalable Video Coding (SVC) and Multiple Descriptive Coding (MDC) to overcome the playback latency in multimedia streaming and maintains an adequate quality of service (QoS) among the users. The problem can be summarized as follows; Given that a video is requested by a peer in the network, what properties of SVC and MDC can be exploited to deliver the video with the highest quality, least upload bandwidth and least delay from all participating peers. However, the solution to these problems is known to be NP hard. Hence, this chapter presents the state of the art in approximation algorithms or techniques that have been proposed to overcome these issues.


Author(s):  
Maitri Rajesh Gohil ◽  
Sumukh Sandeep Maduskar ◽  
Vikrant Gajria ◽  
Ramchandra Mangrulkar

Growing organizations, institutions, and SMEs demand for transformation in all the aspects of their businesses along with the progression in time and technology. When it comes to healthcare, the growth should be heightened to higher levels with necessity. The need of providing quality of service (QoS) in healthcare is taking significant place, allowing health institutions and medical compliances to develop an ecosystem with cutting-edge technology with the same reliability but better productivity and performance. Moreover, the healthcare systems are aiming for a more patient-centric strategy. Healthcare systems work on complicated and traditional methods, oftentimes administered via teams of professionals who manage data and supportive mechanisms of the system. Blockchain could streamline and automate those methods, conserving weeks of effort in the company's production line to increase the overall revenue and discover new opportunities. This chapter aims to illustrate blockchain technology along with its state-of-the-art applications in healthcare.


Author(s):  
Mirko Luca Lobina ◽  
Luigi Atzori ◽  
Fabrizio Boi

IP Telephony provides a way for an enterprise to extend consistent communication services to all employees, whether they are in main campus locations, at branch offices, or working remotely, also with a mobile phone. IP Telephony transmits voice communications over a network using open standard-based Internet protocols. This is both the strength and weakness of IP Telephony as the involved basic transport protocols (RTP, UDP, and IP) are not able to natively guarantee the required application quality of service (QoS). From the point of view of an IP Telephony Service Provider this definitely means possible waste of clients and money. Specifically the problem is at two different levels: i) in some countries, wherelong distance and particularly international call tariffs are high, perhaps due to a lack of competition or due to cross subsidies to other services, the major opportunity for IP Telephony Service Providers is for price arbitrage. This means working on diffusion of an acceptable service, although not at high quality levels; ii) in other countries, where different IP Telephony Service Providers already exist, the problem is competition for offering the best possible quality. The main idea behind this chapter is to analyze specifically the state of the art playout control strategies with the following aims: i) propose the reader the technical state of the art playout control management and planning strategies (overview of basic KPIs for IP Telephony); ii) compare the strategies IP Telephony Service Provider can choose with the aim of saving money and offering a better quality of service; iii) introduce also the state of the art quality index for IP Telephony, that is a set of algorithms for taking into account as many factors as possible to evaluate the service quality; iv) provide the reader with examples on some economic scenarios of IP Telephony.


2002 ◽  
Vol 06 (01) ◽  
pp. 15-26
Author(s):  
Zafar Iqbal Qureshi

Fatima Memorial Hospital is the first charitable Trust Hospital in Pakistan, and its sponsoring body is Ferozesons Trust. In order to continue to provide services to the needy, the Trust needed to continuously improve its financial resources. When Dr. Qureshi took over the charge of the Hospital as its ACEC, he was asked to streamline the management systems to build a lean organization. He decided to outsource the janitorial services as a pilot project to achieve a number of objectives. If the janitorial services experiment proved successful, then the project would extend to laundry work as well. After the janitorial services were outsourced, concerns regarding cleanliness of the Hospital were brought up by patients and the management. They felt that the quality of service being provided by the contractor was not up to desired quality standards. In view of this, ACEC had two concerns: not to de-motivate the contractor; and not to compromise on the quality of service being provided by the contractor.


Sign in / Sign up

Export Citation Format

Share Document