Skip to main content
Erschienen in:
Buchtitelbild

2016 | OriginalPaper | Buchkapitel

Detecting Anomalous Ratings Using Matrix Factorization for Recommender Systems

verfasst von : Zhihai Yang, Zhongmin Cai, Xinyuan Chen

Erschienen in: Web-Age Information Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Personalization recommendation techniques play a key role in the popular E-commerce services such as Amazon, TripAdvisor and etc. In practice, collaborative filtering recommender systems are highly vulnerable to “shilling” attacks due to its openness. Although attack detection based on such attacks has been extensively researched during the past decade, the studies on these issues have not reached an end. They either extract extra features from user profiles or directly calculate similarity between users to capture concerned attackers. In this paper, we propose a novel detection technique to bypass these hard problems, which combines max-margin matrix factorization with Bayesian nonparametrics and outlier detection. Firstly, mean prediction errors for users and items are calculated by utilizing trained prediction model on test sets. And then we continue to comprehensively analyze the distribution of mean prediction errors of items in order to reduce the scope of concerned items. Based on the suspected items, all anomalous users can be finally determined by analyzing the distribution of mean prediction error on each user. Extensive experiments on the MovieLens-100K dataset demonstrate the effectiveness of the proposed method.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
2
The ratio between the number of attackers and genuine users.
 
3
The ratio between the number of items rated by user u and the number of entire items in the recommender systems.
 
Literatur
1.
Zurück zum Zitat Burke, R., Mobasher, B., Williams, C.: Classification features for attack detection in collaborative recommender systems. International Conference on Knowledge Discovery and Data Mining, pp. 17–20 (2006) Burke, R., Mobasher, B., Williams, C.: Classification features for attack detection in collaborative recommender systems. International Conference on Knowledge Discovery and Data Mining, pp. 17–20 (2006)
2.
Zurück zum Zitat Gnnemann, N., Gnnemann, S., Faloutsos, C.: Robust multivariate autoregression for anomaly detection in dynamic product ratings. In: Proceeding WWW 2014 Proceedings of the 23rd International Conference on World Wide Web, pp. 361–372 (2014) Gnnemann, N., Gnnemann, S., Faloutsos, C.: Robust multivariate autoregression for anomaly detection in dynamic product ratings. In: Proceeding WWW 2014 Proceedings of the 23rd International Conference on World Wide Web, pp. 361–372 (2014)
3.
Zurück zum Zitat Gnnemann, S., Gnnemann, N., Faloutsos, C.: Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution. In: KDD 2014, pp. 841–850 (2014) Gnnemann, S., Gnnemann, N., Faloutsos, C.: Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution. In: KDD 2014, pp. 841–850 (2014)
4.
Zurück zum Zitat Gunes, I., Kaleli, C., Bilge, A., Polat, H.: Shilling attacks against recommender systems: a comprehensive survey. Artif. Intell. Rev. pp. 1–33 (2012) Gunes, I., Kaleli, C., Bilge, A., Polat, H.: Shilling attacks against recommender systems: a comprehensive survey. Artif. Intell. Rev. pp. 1–33 (2012)
5.
Zurück zum Zitat Mehta, B.: Unsupervised shilling detection for collaborative filtering. Assoc. Adv. Artif. Intell. (2007) Mehta, B.: Unsupervised shilling detection for collaborative filtering. Assoc. Adv. Artif. Intell. (2007)
6.
Zurück zum Zitat Mehta, B., Hofmann, T., Fankhauser, P.: Lies and propaganda: detecting spam users in collaborative filtering. In: IUI 2007: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 14–21 (2007) Mehta, B., Hofmann, T., Fankhauser, P.: Lies and propaganda: detecting spam users in collaborative filtering. In: IUI 2007: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 14–21 (2007)
7.
Zurück zum Zitat Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User-Adap. Inter. 19, 65–97 (2009)CrossRef Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User-Adap. Inter. 19, 65–97 (2009)CrossRef
8.
Zurück zum Zitat Morid, M., Shajari, M.: Defending recommender systems by influence analysis. Information Retrieval 17, 137–152 (2014)CrossRef Morid, M., Shajari, M.: Defending recommender systems by influence analysis. Information Retrieval 17, 137–152 (2014)CrossRef
9.
Zurück zum Zitat Saleh, A., Desouky, A., Ali, S.: Promoting the performance of vertical recommendation systems by applying new classification techniques. Knowl.-Based Syst. 75, 192–223 (2015)CrossRef Saleh, A., Desouky, A., Ali, S.: Promoting the performance of vertical recommendation systems by applying new classification techniques. Knowl.-Based Syst. 75, 192–223 (2015)CrossRef
10.
Zurück zum Zitat Savage, D., Zhang, X., Yu, X., Chou, P.L., Wang, Q.: Detection of opinion spam based on anomalous rating deviation. Expert Syst. Appl. 42(22), 8650–8657 (2015)CrossRef Savage, D., Zhang, X., Yu, X., Chou, P.L., Wang, Q.: Detection of opinion spam based on anomalous rating deviation. Expert Syst. Appl. 42(22), 8650–8657 (2015)CrossRef
11.
Zurück zum Zitat Seminario, C., Wilson, D.: Assessing impacts of a power user attack on a matrix factorization collaborative recommender system. In: Florida Artificial Intelligence Research Society Conference (2014) Seminario, C., Wilson, D.: Assessing impacts of a power user attack on a matrix factorization collaborative recommender system. In: Florida Artificial Intelligence Research Society Conference (2014)
12.
Zurück zum Zitat Seminario, C., Wilson, D.: Attacking item-based recommender systems with power items. In: ACM Conference on Recommender Systems, pp. 57–64 (2014) Seminario, C., Wilson, D.: Attacking item-based recommender systems with power items. In: ACM Conference on Recommender Systems, pp. 57–64 (2014)
13.
Zurück zum Zitat Su, X., Zeng, H., Chen, Z.: Finding group shilling in recommendation system. In: WWW, pp. 960–961 (2005) Su, X., Zeng, H., Chen, Z.: Finding group shilling in recommendation system. In: WWW, pp. 960–961 (2005)
14.
Zurück zum Zitat Wang, Y., Zhang, L., Tao, H., Wu, Z., Cao, J.: A comparative study of shilling attack detectors for recommender systems. In: The 12th International Conference on Service Systems and Service Management (ICSSSM), pp. 1–6 (2015) Wang, Y., Zhang, L., Tao, H., Wu, Z., Cao, J.: A comparative study of shilling attack detectors for recommender systems. In: The 12th International Conference on Service Systems and Service Management (ICSSSM), pp. 1–6 (2015)
15.
Zurück zum Zitat Williams, C., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. SOCA 1, 157–170 (2007)CrossRef Williams, C., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. SOCA 1, 157–170 (2007)CrossRef
16.
Zurück zum Zitat Williams, C., Mobasher, B., Burke, R., Bhaumik, R.: Detecting profile injection attacks in collaborative filtering: a classification-based approach. In: Advances in Web Mining and Web Usage Analysis, pp. 167–186 (2007) Williams, C., Mobasher, B., Burke, R., Bhaumik, R.: Detecting profile injection attacks in collaborative filtering: a classification-based approach. In: Advances in Web Mining and Web Usage Analysis, pp. 167–186 (2007)
17.
Zurück zum Zitat Wu, Z., Wang, Y., Cao, J.: A survey on shilling attack models and detection techniques for recommender systems. Sci. China 59(7), 551–560 (2014) Wu, Z., Wang, Y., Cao, J.: A survey on shilling attack models and detection techniques for recommender systems. Sci. China 59(7), 551–560 (2014)
18.
Zurück zum Zitat Xia, H., Fang, B., Gao, M., Ma, H., Tang, Y., Wen, J.: A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf. Sci. 306, 150–165 (2015)CrossRef Xia, H., Fang, B., Gao, M., Ma, H., Tang, Y., Wen, J.: A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf. Sci. 306, 150–165 (2015)CrossRef
19.
Zurück zum Zitat Xu, M., Zhu, J.: Discriminative infinite latent feature models. In: Proceedings of the 1st IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP 2013), pp. 184–188 (2013) Xu, M., Zhu, J.: Discriminative infinite latent feature models. In: Proceedings of the 1st IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP 2013), pp. 184–188 (2013)
20.
Zurück zum Zitat Xu, M., Zhu, J., Zhang, B.: Nonparametric max-margin matrix factorization for collaborative prediction. In: Advances in Neural Information Processing Systems (NIPS 2012), pp. 64–72 (2012) Xu, M., Zhu, J., Zhang, B.: Nonparametric max-margin matrix factorization for collaborative prediction. In: Advances in Neural Information Processing Systems (NIPS 2012), pp. 64–72 (2012)
21.
Zurück zum Zitat Xu, M., Zhu, J., Zhang, B.: Fast max-margin matrix factorization with data augmentation. In: Proceedings of the 30th International Conference on Machine Learning, vol. 28, 3, pp. 978–986 (2013) Xu, M., Zhu, J., Zhang, B.: Fast max-margin matrix factorization with data augmentation. In: Proceedings of the 30th International Conference on Machine Learning, vol. 28, 3, pp. 978–986 (2013)
22.
Zurück zum Zitat Zhang, F., Zhou, Q.: A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems. J. Comput. 7(1), 226–234 (2012) Zhang, F., Zhou, Q.: A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems. J. Comput. 7(1), 226–234 (2012)
23.
Zurück zum Zitat Zhang, F., Zhou, Q.: HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl.-Based Syst. (2014) Zhang, F., Zhou, Q.: HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl.-Based Syst. (2014)
24.
Zurück zum Zitat Zhang, X., Lee, T.M.D., Pitsilis, G.: Securing recommender systems against shilling attacks using social-based clustering. J. Comput. Sci. Technol. 28, 616–624 (2013)CrossRef Zhang, X., Lee, T.M.D., Pitsilis, G.: Securing recommender systems against shilling attacks using social-based clustering. J. Comput. Sci. Technol. 28, 616–624 (2013)CrossRef
25.
Zurück zum Zitat Zhang, Z., Kulkarni, S.: Graph-based detection of shilling attacks in recommender systems. In: IEEE International Workshop on Machine Learning for, Signal Processing, pp. 1–6 (2013) Zhang, Z., Kulkarni, S.: Graph-based detection of shilling attacks in recommender systems. In: IEEE International Workshop on Machine Learning for, Signal Processing, pp. 1–6 (2013)
26.
Zurück zum Zitat Zhang, Z., Kulkarni, S.R.: Detection of shilling attacks in recommender systems via spectral clustering. In: International Conference on Information Fusion, pp. 1–8 (2014) Zhang, Z., Kulkarni, S.R.: Detection of shilling attacks in recommender systems via spectral clustering. In: International Conference on Information Fusion, pp. 1–8 (2014)
27.
Zurück zum Zitat Zhou, W., Koh, Y.S., Wen, J.H., Burki, S., Dobbie, G.: Detection of abnormal profiles on group attacks in recommender systems. In: Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, pp. 955–958 (2014) Zhou, W., Koh, Y.S., Wen, J.H., Burki, S., Dobbie, G.: Detection of abnormal profiles on group attacks in recommender systems. In: Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, pp. 955–958 (2014)
28.
Zurück zum Zitat Zhou, W., Wen, J., Koh, Y.S., Alam, S., Dobbie, G.: Attack detection in recommender systems based on target item analysis. In: International Joint Conference on Neural Networks (IJCNN) (2014) Zhou, W., Wen, J., Koh, Y.S., Alam, S., Dobbie, G.: Attack detection in recommender systems based on target item analysis. In: International Joint Conference on Neural Networks (IJCNN) (2014)
29.
Zurück zum Zitat Zhou, W., Wen, J., Koh, Y.S., Xiong, Q., Gao, M., Dobbie, G., Alam, S.: Shilling attacks detection in recommender systems based on target item analysis. PloS one (2015) Zhou, W., Wen, J., Koh, Y.S., Xiong, Q., Gao, M., Dobbie, G., Alam, S.: Shilling attacks detection in recommender systems based on target item analysis. PloS one (2015)
Metadaten
Titel
Detecting Anomalous Ratings Using Matrix Factorization for Recommender Systems
verfasst von
Zhihai Yang
Zhongmin Cai
Xinyuan Chen
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-39958-4_1

Neuer Inhalt