Skip to main content
Erschienen in: Journal of Intelligent Information Systems 3/2017

25.07.2016

Detecting abnormal profiles in collaborative filtering recommender systems

verfasst von: Zhihai Yang, Zhongmin Cai

Erschienen in: Journal of Intelligent Information Systems | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack profiles into CFRSs in order to bias the recommendation results to their benefits. To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. However, relying on limited features to improve the detection performance is difficult seemingly, since the existing features can not fully characterize the attack profiles and genuine profiles. In this paper, we propose a novel detection method to make recommender systems resistant to such attacks. The existing features can be briefly summarized as two aspects including rating behavior based and item distribution based. We firstly formulate the problem as finding a mapping model between rating behavior and item distribution by exploiting the least-squares approximate solution. Based on the trained model, we design a detector by employing a regressor to detect such attacks. Extensive experiments on both the MovieLens-100K and MovieLens-ml-latest-small datasets examine the effectiveness of the proposed detection method. Experimental results demonstrate the outperformance of the proposed approach in comparison with benchmarked method including KNN.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The ratio between the number of attackers and genuine users.
 
2
The ratio between the number of items rated by user u and the number of entire items in the recommender system.
 
5
The ratio between the number of ratings and entire ratings in the rating matrix.
 
Literatur
Zurück zum Zitat Bryan, K., OMahony, M., & Cunningham, P. (2008). Unsupervised retrieval of attack profiles in collaborative recommender systems. In ACM conference on recommender systems (pp. 155–162). Bryan, K., OMahony, M., & Cunningham, P. (2008). Unsupervised retrieval of attack profiles in collaborative recommender systems. In ACM conference on recommender systems (pp. 155–162).
Zurück zum Zitat Burke, R., Mobasher, B., & Williams, C. (2006). Classification features for attack detection in collaborative recommender systems. In International conference on knowledge discovery and data mining (pp. 17–20). Burke, R., Mobasher, B., & Williams, C. (2006). Classification features for attack detection in collaborative recommender systems. In International conference on knowledge discovery and data mining (pp. 17–20).
Zurück zum Zitat Cacheda, F., Carneiro, V., Fernandez, D., & Formoso, V. (2011). Comparison of collaborative filtering algorithms: limitations of current techniques and proposals for scalable, high-performance recommender systems. ACM Transactions on the Web (TWEB), 5(1). Cacheda, F., Carneiro, V., Fernandez, D., & Formoso, V. (2011). Comparison of collaborative filtering algorithms: limitations of current techniques and proposals for scalable, high-performance recommender systems. ACM Transactions on the Web (TWEB), 5(1).
Zurück zum Zitat Cao, J., Wu, Z., Mao, B., & Zhang, Y. (2013). Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web, 16, 729–748.CrossRef Cao, J., Wu, Z., Mao, B., & Zhang, Y. (2013). Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web, 16, 729–748.CrossRef
Zurück zum Zitat Chu, E., Gorinevsky, D., & Boyd, S. (2010). Detecting aircraft performance anomalies from cruise flight data. In AIAA infotech aerospace conference (pp. 20–22). Chu, E., Gorinevsky, D., & Boyd, S. (2010). Detecting aircraft performance anomalies from cruise flight data. In AIAA infotech aerospace conference (pp. 20–22).
Zurück zum Zitat Chung, C., Hsu, P., & Huang, S. (2013). β P: a novel approach to filter out malicious rating profiles from recommender systems. Journal of Decision Support Systems, 55(1), 314–325.CrossRef Chung, C., Hsu, P., & Huang, S. (2013). β P: a novel approach to filter out malicious rating profiles from recommender systems. Journal of Decision Support Systems, 55(1), 314–325.CrossRef
Zurück zum Zitat David, M.W. (2011). Evaluation: from precision, recall and f-measure to roc, informedness, markedness correlation. Journal of Machine Learning Technologies. David, M.W. (2011). Evaluation: from precision, recall and f-measure to roc, informedness, markedness correlation. Journal of Machine Learning Technologies.
Zurück zum Zitat Gunes, I., Kaleli, C., Bilge, A., & Polat, H. (2012). Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review, 42(4), 1–33. Gunes, I., Kaleli, C., Bilge, A., & Polat, H. (2012). Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review, 42(4), 1–33.
Zurück zum Zitat He, F., Wang, X., & Liu, B. (2010). Attack detection by rough set theory in recommendation system. In IEEE international conference on granular computing (pp. 692–695). He, F., Wang, X., & Liu, B. (2010). Attack detection by rough set theory in recommendation system. In IEEE international conference on granular computing (pp. 692–695).
Zurück zum Zitat Hurley, N., OMahony, M., & Silvestre, G. (2007). Attacking recommender systems: a cost-benefit analysis. IEEE Intelligent Systems, 64–68. Hurley, N., OMahony, M., & Silvestre, G. (2007). Attacking recommender systems: a cost-benefit analysis. IEEE Intelligent Systems, 64–68.
Zurück zum Zitat Hurley, N., Cheng, Z., & Zhang, M. (2009). Statistical attack detection. In Proceedings of the 3rd ACM conference on recommender systems (RecSys’09) (pp. 149–156). Hurley, N., Cheng, Z., & Zhang, M. (2009). Statistical attack detection. In Proceedings of the 3rd ACM conference on recommender systems (RecSys’09) (pp. 149–156).
Zurück zum Zitat Jia, D., Zhang, F., & Liu, S. (2013). A robust collaborative filtering recommendation algorithm based on multidimensional trust model. Journal of Software, 8(1). Jia, D., Zhang, F., & Liu, S. (2013). A robust collaborative filtering recommendation algorithm based on multidimensional trust model. Journal of Software, 8(1).
Zurück zum Zitat Li, C., & Luo, Z. (2011). Detection of shilling attacks in collaborative filtering recommender systems. In International conference of soft computing and pattern recognition (pp. 190–193). Li, C., & Luo, Z. (2011). Detection of shilling attacks in collaborative filtering recommender systems. In International conference of soft computing and pattern recognition (pp. 190–193).
Zurück zum Zitat Mehta, B., Hofmann, T., & Fankhauser, P. (2007). Lies and propaganda: detecting spam users in collaborative filtering. In Proceedings of the 12th international conference on intelligent user interfaces (IUI’07) (pp. 14–21). Mehta, B., Hofmann, T., & Fankhauser, P. (2007). Lies and propaganda: detecting spam users in collaborative filtering. In Proceedings of the 12th international conference on intelligent user interfaces (IUI’07) (pp. 14–21).
Zurück zum Zitat Mobasher, B., Burke, R., & Sandvig, J. (2006). Model-based collaborative filtering as a defense against profile injection attacks. In American Association for Artificial Intelligence. Mobasher, B., Burke, R., & Sandvig, J. (2006). Model-based collaborative filtering as a defense against profile injection attacks. In American Association for Artificial Intelligence.
Zurück zum Zitat Mobasher, B., Burke, R., Bhaumil, B., & Williams, C. (2007a). Towards trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 7(4), 23–38.CrossRef Mobasher, B., Burke, R., Bhaumil, B., & Williams, C. (2007a). Towards trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 7(4), 23–38.CrossRef
Zurück zum Zitat Mobasher, B., Burke, R., Bhaumik, R., & Williams, C. (2007b). Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology (TOIT), 7(4), 38.CrossRef Mobasher, B., Burke, R., Bhaumik, R., & Williams, C. (2007b). Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology (TOIT), 7(4), 38.CrossRef
Zurück zum Zitat Morid, M., & Shajari, M. (2013). Defending recommender systems by influence analysis. Information Retrieval, 17(2), 137–152.CrossRef Morid, M., & Shajari, M. (2013). Defending recommender systems by influence analysis. Information Retrieval, 17(2), 137–152.CrossRef
Zurück zum Zitat Seminario, C.E. (2013). Accuracy and robustness impacts of power user attacks on collaborative recommender systems. In ACM conference on recommender systems. Seminario, C.E. (2013). Accuracy and robustness impacts of power user attacks on collaborative recommender systems. In ACM conference on recommender systems.
Zurück zum Zitat Seminario, C.E., & Wilson, D.C. (2014). Attacking item-based recommender systems with power items. In ACM conference on recommender systems (pp. 57–64). Seminario, C.E., & Wilson, D.C. (2014). Attacking item-based recommender systems with power items. In ACM conference on recommender systems (pp. 57–64).
Zurück zum Zitat Williams, C.A., Mobasher, B., & Burke, R. (2007a). Defending recommender systems: detection of profile injection attacks. SOCA, 1(3), 157–170.CrossRef Williams, C.A., Mobasher, B., & Burke, R. (2007a). Defending recommender systems: detection of profile injection attacks. SOCA, 1(3), 157–170.CrossRef
Zurück zum Zitat Williams, C.A., Mobasher, B., Burke, R., & Bhaumik, R. (2007b). Detecting profile injection attacks in collaborative filtering: a classification-based approach. In Advances in web mining and web usage analysis (pp. 167–186). Williams, C.A., Mobasher, B., Burke, R., & Bhaumik, R. (2007b). Detecting profile injection attacks in collaborative filtering: a classification-based approach. In Advances in web mining and web usage analysis (pp. 167–186).
Zurück zum Zitat Wu, Z.A., Wu, J.J., Cao, J., & Tao, D.C. (2012). HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In ACM SIGKDD conference on knowledge discovery and data mining (pp. 985–993). Wu, Z.A., Wu, J.J., Cao, J., & Tao, D.C. (2012). HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In ACM SIGKDD conference on knowledge discovery and data mining (pp. 985–993).
Zurück zum Zitat Zhang, Z., & Kulkarni, S. (2013). Graph-based detection of shilling attacks in recommender systems. In IEEE international workshop on machine learning for signal processing (pp. 1–6). Zhang, Z., & Kulkarni, S. (2013). Graph-based detection of shilling attacks in recommender systems. In IEEE international workshop on machine learning for signal processing (pp. 1–6).
Zurück zum Zitat Zhang, F., & Zhou, Q. (2012). A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems. Journal on Computing, 7(1), 226–234. Zhang, F., & Zhou, Q. (2012). A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems. Journal on Computing, 7(1), 226–234.
Zurück zum Zitat Zhang, F., & Zhou, Q. (2014). HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowledge-Based Systems, 65, 96–105.CrossRef Zhang, F., & Zhou, Q. (2014). HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowledge-Based Systems, 65, 96–105.CrossRef
Zurück zum Zitat Zhou, W., Koh, Y.S., Wen, J.H., Burki, S., & Dobbie, G. (2014). Detection of abnormal profiles on group attacks in recommender systems. In Proceedings of the 37th international ACM SIGIR conference on Research on development in information retrieval (pp. 955–958). Zhou, W., Koh, Y.S., Wen, J.H., Burki, S., & Dobbie, G. (2014). Detection of abnormal profiles on group attacks in recommender systems. In Proceedings of the 37th international ACM SIGIR conference on Research on development in information retrieval (pp. 955–958).
Zurück zum Zitat Zou, J., & Fekri, F. (2013). A belief propagation approach for detecting shilling attacks in collaborative filtering. In Proceedings of the 22nd ACM international conference on conference on information & knowledge management (CIKM) (pp. 1837–1840). Zou, J., & Fekri, F. (2013). A belief propagation approach for detecting shilling attacks in collaborative filtering. In Proceedings of the 22nd ACM international conference on conference on information & knowledge management (CIKM) (pp. 1837–1840).
Metadaten
Titel
Detecting abnormal profiles in collaborative filtering recommender systems
verfasst von
Zhihai Yang
Zhongmin Cai
Publikationsdatum
25.07.2016
Verlag
Springer US
Erschienen in
Journal of Intelligent Information Systems / Ausgabe 3/2017
Print ISSN: 0925-9902
Elektronische ISSN: 1573-7675
DOI
https://doi.org/10.1007/s10844-016-0424-5

Weitere Artikel der Ausgabe 3/2017

Journal of Intelligent Information Systems 3/2017 Zur Ausgabe