D. Dhivyalakshmi, K. Kalaivani, V. Tamilarasi, P. Bhavani
{"title":"使用Rate Auditing Tool (RAT)确定在线信誉系统的安全性","authors":"D. Dhivyalakshmi, K. Kalaivani, V. Tamilarasi, P. Bhavani","doi":"10.1109/ICICES.2014.7033951","DOIUrl":null,"url":null,"abstract":"In our proposed model we implement Rate Auditing Tool (RAT) to monitor each and every rating manipulation. It checks whether the time logged in and logged out matches the stipulated time for viewing any videos or messages and giving appropriate rating. It monitors either the video provided is fully or atleast partly viewed thus accordingly their ratings given. It also checks whether the login in network which is providing rating is either from same location or its location varies each and every time from vast geographical location. It also checks whether from same ip address multiple logins giving ratings continuously. Thus by doing this the attacker is also detected and given counter measure to their attacks.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"13 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Ascertaining security in online reputation systems using Rate Auditing Tool (RAT)\",\"authors\":\"D. Dhivyalakshmi, K. Kalaivani, V. Tamilarasi, P. Bhavani\",\"doi\":\"10.1109/ICICES.2014.7033951\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In our proposed model we implement Rate Auditing Tool (RAT) to monitor each and every rating manipulation. It checks whether the time logged in and logged out matches the stipulated time for viewing any videos or messages and giving appropriate rating. It monitors either the video provided is fully or atleast partly viewed thus accordingly their ratings given. It also checks whether the login in network which is providing rating is either from same location or its location varies each and every time from vast geographical location. It also checks whether from same ip address multiple logins giving ratings continuously. Thus by doing this the attacker is also detected and given counter measure to their attacks.\",\"PeriodicalId\":13713,\"journal\":{\"name\":\"International Conference on Information Communication and Embedded Systems (ICICES2014)\",\"volume\":\"13 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Information Communication and Embedded Systems (ICICES2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICES.2014.7033951\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Communication and Embedded Systems (ICICES2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2014.7033951","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ascertaining security in online reputation systems using Rate Auditing Tool (RAT)
In our proposed model we implement Rate Auditing Tool (RAT) to monitor each and every rating manipulation. It checks whether the time logged in and logged out matches the stipulated time for viewing any videos or messages and giving appropriate rating. It monitors either the video provided is fully or atleast partly viewed thus accordingly their ratings given. It also checks whether the login in network which is providing rating is either from same location or its location varies each and every time from vast geographical location. It also checks whether from same ip address multiple logins giving ratings continuously. Thus by doing this the attacker is also detected and given counter measure to their attacks.