Skip to main content

2016 | OriginalPaper | Buchkapitel

12. Attack-Resistant Recommender Systems

verfasst von : Charu C. Aggarwal

Erschienen in: Recommender Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The input to recommender systems is typically provided through open platforms. Almost anyone can register and submit a review at sites such as Amazon.com and Epinions.com. Like any other data-mining system, the effectiveness of a recommender system depends almost exclusively on the quality of the data available to it. Unfortunately, there are significant motivations for participants to submit incorrect feedback about items for personal gain or for malicious reasons:

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The ROC curve is used in a different context here than in Chapter 7 In Chapter 7, the ROC curve measures the effectiveness of ranking items for recommendations. Here, we measure the effectiveness of ranking user profiles based on their likelihood of being fake. However, the general principle of using the ROC curve is similar in both cases, because a ranking is compared with the binary ground-truth in both cases.
 
Literatur
[43]
Zurück zum Zitat G. K. Al Mamunur Rashid, G. Karypis, and J. Riedl. Influence in ratings-based recommender systems: An algorithm-independent approach. SIAM Conference on Data Mining, 2005. G. K. Al Mamunur Rashid, G. Karypis, and J. Riedl. Influence in ratings-based recommender systems: An algorithm-independent approach. SIAM Conference on Data Mining, 2005.
[44]
Zurück zum Zitat X. Amatriain, J. Pujol, N. Tintarev, and N. Oliver. Rate it again: increasing recommendation accuracy by user re-rating. ACM Conference on Recommender Systems, pp. 173–180, 2009. X. Amatriain, J. Pujol, N. Tintarev, and N. Oliver. Rate it again: increasing recommendation accuracy by user re-rating. ACM Conference on Recommender Systems, pp. 173–180, 2009.
[78]
Zurück zum Zitat R. Bhaumik, C. Williams, B. Mobasher, and R. Burke. Securing collaborative filtering against malicious attacks through anomaly detection. Workshop on Intelligent Techniques for Web Personalization (ITWP), 2006. R. Bhaumik, C. Williams, B. Mobasher, and R. Burke. Securing collaborative filtering against malicious attacks through anomaly detection. Workshop on Intelligent Techniques for Web Personalization (ITWP), 2006.
[79]
Zurück zum Zitat R. Bhaumik, R. Burke, snd B. Mobasher. Crawling Attacks Against Web-based Recommender Systems. International Conference on Data Mining (DMIN), pp. 183–189, 2007. R. Bhaumik, R. Burke, snd B. Mobasher. Crawling Attacks Against Web-based Recommender Systems. International Conference on Data Mining (DMIN), pp. 183–189, 2007.
[110]
Zurück zum Zitat K. Bryan, M. O’Mahony, and P. Cunningham. Unsupervised retrieval of attack profiles in collaborative recommender systems. ACM Conference on Recommender Systems, pp. 155–162, 2008. K. Bryan, M. O’Mahony, and P. Cunningham. Unsupervised retrieval of attack profiles in collaborative recommender systems. ACM Conference on Recommender Systems, pp. 155–162, 2008.
[119]
Zurück zum Zitat R. Burke, M. O’Mahony, and N. Hurley. Robust collaborative recommendation. Recommender Systems Handbook, Springer, pp. 805–835, 2011. R. Burke, M. O’Mahony, and N. Hurley. Robust collaborative recommendation. Recommender Systems Handbook, Springer, pp. 805–835, 2011.
[122]
Zurück zum Zitat R. Burke, B. Mobasher, R. Zabicki, and R. Bhaumik. Identifying attack models for secure recommendation. Beyond Personalization: A Workshop on the Next Generation of Recommender Systems, 2005. R. Burke, B. Mobasher, R. Zabicki, and R. Bhaumik. Identifying attack models for secure recommendation. Beyond Personalization: A Workshop on the Next Generation of Recommender Systems, 2005.
[123]
Zurück zum Zitat R. Burke, B. Mobasher, and R. Bhaumik. Limited knowledge shilling attacks in collaborative filtering systems. IJCAI Workshop in Intelligent Techniques for Personalization, 2005. R. Burke, B. Mobasher, and R. Bhaumik. Limited knowledge shilling attacks in collaborative filtering systems. IJCAI Workshop in Intelligent Techniques for Personalization, 2005.
[124]
Zurück zum Zitat R. Burke, B. Mobasher, C. Williams, and R. Bhaumik. Classification features for attack detection in collaborative recommender systems. ACM KDD Conference, pp. 542–547, 2006. R. Burke, B. Mobasher, C. Williams, and R. Bhaumik. Classification features for attack detection in collaborative recommender systems. ACM KDD Conference, pp. 542–547, 2006.
[132]
Zurück zum Zitat E. Candes, X. Li, Y. Ma, and J. Wright. Robust principal component analysis?. Journal of the ACM (JACM), 58(3), 11, 2011. E. Candes, X. Li, Y. Ma, and J. Wright. Robust principal component analysis?. Journal of the ACM (JACM), 58(3), 11, 2011.
[158]
Zurück zum Zitat P. Chirita, W. Nejdl, and C. Zamfir. Preventing shilling attacks in online recommender systems. ACM International Workshop on Web Information and Data Management, pp. 67–74, 2005. P. Chirita, W. Nejdl, and C. Zamfir. Preventing shilling attacks in online recommender systems. ACM International Workshop on Web Information and Data Management, pp. 67–74, 2005.
[236]
Zurück zum Zitat I. Gunes, C. Kaleli, A. Bilge, and H. Polat. Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review, 42(4), 767–799, 2014.CrossRef I. Gunes, C. Kaleli, A. Bilge, and H. Polat. Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review, 42(4), 767–799, 2014.CrossRef
[246]
Zurück zum Zitat J. Herlocker, J. Konstan, L. Terveen, and J. Riedl. Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems (TOIS), 22(1), pp. 5–53, 2004.CrossRef J. Herlocker, J. Konstan, L. Terveen, and J. Riedl. Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems (TOIS), 22(1), pp. 5–53, 2004.CrossRef
[285]
Zurück zum Zitat I. Jolliffe. Principal component analysis, 2nd edition, Springer, 2002. I. Jolliffe. Principal component analysis, 2nd edition, Springer, 2002.
[329]
Zurück zum Zitat S. Lam and J. Riedl. Shilling recommender systems for fun and profit. World Wide Web Conference, pp. 393–402, 2004. S. Lam and J. Riedl. Shilling recommender systems for fun and profit. World Wide Web Conference, pp. 393–402, 2004.
[394]
Zurück zum Zitat M. O’Mahony, N. Hurley, and G. Silvestre. Promoting recommendations: An attack on collaborative filtering. Database and Expert Systems Applications, pp. 494–503, 2002. M. O’Mahony, N. Hurley, and G. Silvestre. Promoting recommendations: An attack on collaborative filtering. Database and Expert Systems Applications, pp. 494–503, 2002.
[395]
Zurück zum Zitat M. O’Mahony, N. Hurley, G. Silvestre. An evaluation of the performance of collaborative filtering. International Conference on Artificial Intelligence and Cognitive Science (AICS), pp. 164–168, 2003. M. O’Mahony, N. Hurley, G. Silvestre. An evaluation of the performance of collaborative filtering. International Conference on Artificial Intelligence and Cognitive Science (AICS), pp. 164–168, 2003.
[396]
Zurück zum Zitat M. O’Mahony, N. Hurley, G. Silvestre. Recommender systems: Attack types and strategies. National Conference on Artificial Intelligence (AAAI), pp. 334–339, 2005. M. O’Mahony, N. Hurley, G. Silvestre. Recommender systems: Attack types and strategies. National Conference on Artificial Intelligence (AAAI), pp. 334–339, 2005.
[397]
Zurück zum Zitat M. O’Mahony, N. Hurley, G. Silvestre. An evaluation of neighbourhood formation on the performance of collaborative filtering. Artificial Intelligence Review, 21(1), pp. 215–228, 2004.CrossRefMATH M. O’Mahony, N. Hurley, G. Silvestre. An evaluation of neighbourhood formation on the performance of collaborative filtering. Artificial Intelligence Review, 21(1), pp. 215–228, 2004.CrossRefMATH
[424]
Zurück zum Zitat B. Mehta, and T. Hofmann. A survey of attack-resistant collaborative filtering algorithms. IEEE Data Enginerring Bulletin, 31(2), pp. 14–22, 2008. B. Mehta, and T. Hofmann. A survey of attack-resistant collaborative filtering algorithms. IEEE Data Enginerring Bulletin, 31(2), pp. 14–22, 2008.
[425]
Zurück zum Zitat B. Mehta, T. Hofmann, and P. Fankhauser. Lies and propaganda: detecting spam users in collaborative filtering. International Conference on Intelligent User Interfaces, pp. 14–21, 2007. B. Mehta, T. Hofmann, and P. Fankhauser. Lies and propaganda: detecting spam users in collaborative filtering. International Conference on Intelligent User Interfaces, pp. 14–21, 2007.
[426]
Zurück zum Zitat B. Mehta, T. Hofmann, and W. Nejdl. Robust collaborative filtering. ACM Conference on Recommender Systems, pp. 49–56, 2007. B. Mehta, T. Hofmann, and W. Nejdl. Robust collaborative filtering. ACM Conference on Recommender Systems, pp. 49–56, 2007.
[427]
Zurück zum Zitat B. Mehta and W. Nejdl. Unsupervised strategies for shilling detection and robust collaborative filtering. User Modeling and User-Adapted Interaction, 19(1–2), pp. 65–97, 2009.CrossRef B. Mehta and W. Nejdl. Unsupervised strategies for shilling detection and robust collaborative filtering. User Modeling and User-Adapted Interaction, 19(1–2), pp. 65–97, 2009.CrossRef
[428]
Zurück zum Zitat B. Mehta and W. Nejdl. Attack resistant collaborative filtering. ACM SIGIR Conference, pp. 75–82, 2008. B. Mehta and W. Nejdl. Attack resistant collaborative filtering. ACM SIGIR Conference, pp. 75–82, 2008.
[444]
Zurück zum Zitat B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology (TOIT), 7(4), 23, 2007. B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology (TOIT), 7(4), 23, 2007.
[445]
Zurück zum Zitat B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Effective attack models for shilling item-based collaborative filtering systems. WebKDD Workshop, 2005. B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Effective attack models for shilling item-based collaborative filtering systems. WebKDD Workshop, 2005.
[446]
Zurück zum Zitat B. Mobasher, R. Burke, and J. Sandvig. Model-based collaborative filtering as a defense against profile injection attacks. AAAI Conference, Vol. 6, p. 1388, 2006. B. Mobasher, R. Burke, and J. Sandvig. Model-based collaborative filtering as a defense against profile injection attacks. AAAI Conference, Vol. 6, p. 1388, 2006.
[502]
Zurück zum Zitat P. Resnick and R. Sami. The influence limiter: provably manipulation-resistant recommender systems. ACM Conference on Recommender Systems, pp. 25–32, 2007. P. Resnick and R. Sami. The influence limiter: provably manipulation-resistant recommender systems. ACM Conference on Recommender Systems, pp. 25–32, 2007.
[503]
Zurück zum Zitat P. Resnick and R. Sami. The information cost of manipulation resistance in recommender systems. ACM Conference on Recommender Systems, pp. 147–154, 2008. P. Resnick and R. Sami. The information cost of manipulation resistance in recommender systems. ACM Conference on Recommender Systems, pp. 147–154, 2008.
[512]
Zurück zum Zitat P. Rousseeuw and A. Leroy. Robust regression and outlier detection John Wiley and Sons, 2005. P. Rousseeuw and A. Leroy. Robust regression and outlier detection John Wiley and Sons, 2005.
[522]
Zurück zum Zitat J. Sandvig, B. Mobasher, and R. Burke. Robustness of collaborative recommendation based on association rule mining. ACM Conference on Recommender Systems, pp. 105–12, 2007. J. Sandvig, B. Mobasher, and R. Burke. Robustness of collaborative recommendation based on association rule mining. ACM Conference on Recommender Systems, pp. 105–12, 2007.
[523]
Zurück zum Zitat J. Sandvig, B. Mobasher, and R. Burke. A survey of collaborative recommendation and the robustness of model-based algorithms. IEEE Data Engineering Bulletin, 31(2), pp. 3–13, 2008. J. Sandvig, B. Mobasher, and R. Burke. A survey of collaborative recommendation and the robustness of model-based algorithms. IEEE Data Engineering Bulletin, 31(2), pp. 3–13, 2008.
[572]
Zurück zum Zitat X. Su, H. Zeng, and Z. Chen. Finding group shilling in recommendation system. World Wide Web Conference, pp. 960–961, 2005. X. Su, H. Zeng, and Z. Chen. Finding group shilling in recommendation system. World Wide Web Conference, pp. 960–961, 2005.
[609]
Zurück zum Zitat B. van Roy and X. Yan. Manipulation-resistant collaborative filtering systems. ACM Conference on Recommender Systems, pp. 165–172, 2009. B. van Roy and X. Yan. Manipulation-resistant collaborative filtering systems. ACM Conference on Recommender Systems, pp. 165–172, 2009.
[619]
Zurück zum Zitat L. von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. Advances in Cryptology – EUROCRYPT, pp. 294–311, 2003. L. von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. Advances in Cryptology – EUROCRYPT, pp. 294–311, 2003.
[630]
Zurück zum Zitat C. Williams, B. Mobasher, and R. Burke. Defending recommender systems: detection of profile injection attacks. Service Oriented Computing and Applications, 1(3), pp. 157–170, 2007.CrossRef C. Williams, B. Mobasher, and R. Burke. Defending recommender systems: detection of profile injection attacks. Service Oriented Computing and Applications, 1(3), pp. 157–170, 2007.CrossRef
[631]
Zurück zum Zitat C. Williams, B. Mobasher, R. Burke, J. Sandvig, and R. Bhaumik. Detection of obfuscated attacks in collaborative recommender systems. ECAI Workshop on Recommender Systems, 2006. C. Williams, B. Mobasher, R. Burke, J. Sandvig, and R. Bhaumik. Detection of obfuscated attacks in collaborative recommender systems. ECAI Workshop on Recommender Systems, 2006.
[668]
Zurück zum Zitat S. Zhang, A. Chakrabarti, J. Ford, and F. Makedon. Attack detection in time series for recommender systems. ACM KDD Conference, pp. 809–814, 2006. S. Zhang, A. Chakrabarti, J. Ford, and F. Makedon. Attack detection in time series for recommender systems. ACM KDD Conference, pp. 809–814, 2006.
Metadaten
Titel
Attack-Resistant Recommender Systems
verfasst von
Charu C. Aggarwal
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-29659-3_12