Skip to main content

Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Table 1 Overview of selected seller attacks in electronic marketplaces

From: TRIVIA: visualizing reputation profiles to detect malicious sellers in electronic marketplaces

Attack Description
Playbook Playbooks are sequences of actions that allow the maximum outcome/profit for the player under specific auxiliary conditions. A simple example would be an on-off attack where a seller acts honestly to build high reputation by selling high quality products. After a particular time the seller changes his behavior and starts selling low quality products (under low production costs) and “milks” the high reputation. This sequence can be run through again and again. Overall, the seller stays unsuspicious [42]. This attack is particularly effective if the reputation metric “forgets” negative ratings.
Value Imbalance Attack Sellers making use of the value imbalance problem build up high reputation selling cheap products while cheating on the expensive ones. In contrast to playbooks, this attack is non periodical but the malicious seller has to keep a balance between good and bad behavior to keep his reputation at a certain level for the whole time. Zhang et al. [43] extended the term of value imbalance to transaction context imbalance where not only the value but also the product type or the time can be used for asymmetrical allocation of good service.
Reputation Lag Attack Usually, there is a time-lag between the advance payment and the delivery. Since referrals or ratings are normally made after the product is received, a malicious seller can exploit that time-frame by selling many low quality products before being rated badly for the first time.
Proliferation Attack In a proliferation attack, the seller offers the same product from several accounts or channels to increase the probability that a buyer chooses his product instead of buying from a different seller offering the same product. Although often named as an attack on reputation systems, the “malicious” sellers do not really cheat on their buyers nor do they manipulate the reputation system. However, they get an advantage of their competitors. (The proliferation attack can be considered as a subset of the Sybil attack)
Re-entry Attack Performing a re-entry attack (often referred to as whitewashing or newcomer attack), the malicious seller opens an account, cheats on the buyers and leaves the community to open a new account whenever his reputation is damaged. In re-entry attacks, the actor does never have to behave good. This type of attacks particularly exploits systems where a registration without any proof of identity is possible.
Collusion If multiple actors coordinate their behavior to gain an advantage over the rest, this is called collusion. The purpose of collusions can be various, e.g. unfairly increase/decrease the reputation of an actor, discriminate groups or run coordinated playbooks.
Sybil Attack In contrast to collusions where the accounts are created by multiple individuals, the Sybil attack is performed by one attacker who creates a number of accounts (pseudonyms). Due to the greater influence, the attacker can easily manipulate reputation values.