CFP last date
20 March 2026
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2026

Submit your paper
Know more
Random Articles
Reseach Article

AI-based Approaches for Detecting Rating Manipulation and Fraudulent Behavior in Online Trust Systems: A Comprehensive Review

by Nwosu Levi Anyehechukwu, Nwosu Cynthia Chideraa, Ogbonna Francisca Chinwendu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 91
Year of Publication: 2026
Authors: Nwosu Levi Anyehechukwu, Nwosu Cynthia Chideraa, Ogbonna Francisca Chinwendu
10.5120/ijca2026926416

Nwosu Levi Anyehechukwu, Nwosu Cynthia Chideraa, Ogbonna Francisca Chinwendu . AI-based Approaches for Detecting Rating Manipulation and Fraudulent Behavior in Online Trust Systems: A Comprehensive Review. International Journal of Computer Applications. 187, 91 ( Mar 2026), 11-18. DOI=10.5120/ijca2026926416

@article{ 10.5120/ijca2026926416,
author = { Nwosu Levi Anyehechukwu, Nwosu Cynthia Chideraa, Ogbonna Francisca Chinwendu },
title = { AI-based Approaches for Detecting Rating Manipulation and Fraudulent Behavior in Online Trust Systems: A Comprehensive Review },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2026 },
volume = { 187 },
number = { 91 },
month = { Mar },
year = { 2026 },
issn = { 0975-8887 },
pages = { 11-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number91/ai-based-approaches-for-detecting-rating-manipulation-and-fraudulent-behavior-in-online-trust-systems-a-comprehensive-review/ },
doi = { 10.5120/ijca2026926416 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-03-20T22:55:41.936778+05:30
%A Nwosu Levi Anyehechukwu
%A Nwosu Cynthia Chideraa
%A Ogbonna Francisca Chinwendu
%T AI-based Approaches for Detecting Rating Manipulation and Fraudulent Behavior in Online Trust Systems: A Comprehensive Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 91
%P 11-18
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The proliferation of e-commerce platforms and online communities has necessitated robust trust mechanisms to facilitate secure transactions among anonymous users. Trust and reputation systems serve as digital surrogates for traditional word-of-mouth recommendations, enabling users to make informed decisions based on aggregated feedback from prior interactions. However, these systems face critical vulnerabilities from malicious users who manipulate ratings through subtle and calculated attacks, including rating inflation, deflation, and collusion. This paper presents a comprehensive review of computational approaches for building trustworthy reputation systems, with emphasis on detecting fraudulent behavior and rating manipulation. The review systematically examines trust computation models, malicious user detection techniques, attack mitigation strategies, and privacy-preserving mechanisms in online communities. The research synthesizes findings spanning Bayesian reputation engines, statistical filtering methods, machine learning algorithms, and cryptographic techniques for secure trust evaluation. Persistent challenges are identified including the cold-start problem, incentive mechanism design, privacy preservation, and robustness against sophisticated attack vectors. Furthermore, emerging trends in artificial intelligence and distributed systems that offer promising directions for developing next-generation trust architectures are discussed. The analysis reveals that while significant progress has been made in trust computation and attack detection, critical gaps remain in creating adaptive systems that balance security, privacy, user motivation, and computational efficiency. This review provides researchers and practitioners with a structured understanding of the current landscape and identifies opportunities for advancing the state-of-the-art in online trust management.

References
  1. Audun, J., Ismail, R., & Boyd, C. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618-644.
  2. Resnick, P., & Zeckhauser, R. 2002. Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system. The Economics of the Internet and E-commerce, 11(2), 23-47.
  3. Oh, H.-K., Kim, S.-W., Park, S., & Zhou, M. 2015. An algorithm for calculating a trustworthy reputation in a social network. Journal of Information Science and Engineering, 31(4), 1269-1285.
  4. Josang, A., & Golbeck, J. 2009. Challenges for robust trust and reputation systems. Proceedings of the 5th International Workshop on Security and Trust Management, 1-12.
  5. Whitby, A., Josang, A., & Indulska, J. 2004. Filtering out unfair ratings in Bayesian reputation systems. The Icfain Journal of Management Research, 3(2), 48-64.
  6. Dellarocas, C. 2001. Analyzing the economic efficiency of eBay-like online reputation reporting mechanisms. Proceedings of the 3rd ACM Conference on Electronic Commerce, 171-179.
  7. Liao, H., Zeng, A., Xiao, R., Ren, Z.-M., & Chen, D.-B. 2014. Ranking reputation and quality in online rating systems. PLoS ONE, 9(5), e97146.
  8. Bin, Y., & Singh, M. P. 2003. Detecting deception in reputation management. Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, 73-80.
  9. Wang, Y., Liang, J., & Xu, Z. 2013. Trust evaluation in P2P network based on trust correlation coefficient. International Journal of Digital Content Technology and its Applications, 7(3), 456-465.
  10. Gao, J., & Zhou, T. 2017. Evaluating user reputation in online rating systems via an iterative group-based ranking method. Physica A: Statistical Mechanics and its Applications, 473, 546-560.
  11. Oh, H.-K., Kim, S.-W., Park, S., & Zhou, M. 2015. An algorithm for calculating a trustworthy reputation in a social network. Journal of Information Science and Engineering, 31(4), 1269-1285.
  12. Bin, Y., & Singh, M. P. 2003. Detecting deception in reputation management. Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, 73-80.
  13. Dellarocas, C. 2000. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. Proceedings of the 2nd ACM Conference on Electronic Commerce, 150-157.
  14. Zou, Y., Gu, L., Li, G., Xie, B., & Mei, H. 2007. An approach to rectify the prejudicial feedback ratings in web services management. IEEE International Conference on Services Computing, 446-453.
  15. Rivest, R. L., Shamir, A., & Adleman, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
  16. Aberer, K., & Despotovic, Z. 2001. Managing trust in a peer-2-peer information system. Proceedings of the 10th International Conference on Information and Knowledge Management, 310-317.
  17. Yan, Z., Chen, Y., & Shen, Y. 2013. A practical reputation system for pervasive social chatting. Journal of Computer and System Sciences, 79(5), 556-572.
  18. Huynh, T. D., Jennings, N. R., & Shadbolt, N. R. 2006. An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems, 13(2), 119-154.
  19. Bedi, P., & Banati, H. 2006. Assessing user trust in websites. Proceedings of the First International Conference on Internet Multimedia Services Architecture and Applications, 1-6.
  20. Moyano, F., Fernandez-Gago, C., & Lopez, J. 2012. A conceptual framework for trust models. Proceedings of the 9th International Conference on Trust, Privacy and Security in Digital Business, 93-104.
  21. Sonja, U., Grabner-Krauter, S., & Kaluscha, E. A. 2009. Trust and reputation management in virtual communities. Information Systems Frontiers, 11(4), 401-412.
  22. Benevenuto, F., Rodrigues, T., Almeida, V., & Almeida, J. 2009. Detecting spammers and content promoters in online video social networks. Proceedings of the 32nd International ACM SIGIR Conference, 620-627.
  23. Apostolou, B., Belanger, F., & Schaupp, L. C. 2017. Online communities satisfaction and continued use intention. Information Systems and e-Business Management, 15(4), 859-879.
  24. Sanger, J., Richthammer, C., & Pernul, G. 2015. Reusable components for online reputation systems. Journal of Trust Management, 2(1), 1-24.
Index Terms

Computer Science
Information Sciences

Keywords

Trust systems reputation management rating manipulation fraud detection online communities Bayesian reputation malicious user detection e-commerce security