Skip to main content
Top
Published in:
Cover of the book

2016 | OriginalPaper | Chapter

Detecting Anomalous Ratings Using Matrix Factorization for Recommender Systems

Authors : Zhihai Yang, Zhongmin Cai, Xinyuan Chen

Published in: Web-Age Information Management

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Personalization recommendation techniques play a key role in the popular E-commerce services such as Amazon, TripAdvisor and etc. In practice, collaborative filtering recommender systems are highly vulnerable to “shilling” attacks due to its openness. Although attack detection based on such attacks has been extensively researched during the past decade, the studies on these issues have not reached an end. They either extract extra features from user profiles or directly calculate similarity between users to capture concerned attackers. In this paper, we propose a novel detection technique to bypass these hard problems, which combines max-margin matrix factorization with Bayesian nonparametrics and outlier detection. Firstly, mean prediction errors for users and items are calculated by utilizing trained prediction model on test sets. And then we continue to comprehensively analyze the distribution of mean prediction errors of items in order to reduce the scope of concerned items. Based on the suspected items, all anomalous users can be finally determined by analyzing the distribution of mean prediction error on each user. Extensive experiments on the MovieLens-100K dataset demonstrate the effectiveness of the proposed method.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
2
The ratio between the number of attackers and genuine users.
 
3
The ratio between the number of items rated by user u and the number of entire items in the recommender systems.
 
Literature
1.
go back to reference Burke, R., Mobasher, B., Williams, C.: Classification features for attack detection in collaborative recommender systems. International Conference on Knowledge Discovery and Data Mining, pp. 17–20 (2006) Burke, R., Mobasher, B., Williams, C.: Classification features for attack detection in collaborative recommender systems. International Conference on Knowledge Discovery and Data Mining, pp. 17–20 (2006)
2.
go back to reference Gnnemann, N., Gnnemann, S., Faloutsos, C.: Robust multivariate autoregression for anomaly detection in dynamic product ratings. In: Proceeding WWW 2014 Proceedings of the 23rd International Conference on World Wide Web, pp. 361–372 (2014) Gnnemann, N., Gnnemann, S., Faloutsos, C.: Robust multivariate autoregression for anomaly detection in dynamic product ratings. In: Proceeding WWW 2014 Proceedings of the 23rd International Conference on World Wide Web, pp. 361–372 (2014)
3.
go back to reference Gnnemann, S., Gnnemann, N., Faloutsos, C.: Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution. In: KDD 2014, pp. 841–850 (2014) Gnnemann, S., Gnnemann, N., Faloutsos, C.: Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution. In: KDD 2014, pp. 841–850 (2014)
4.
go back to reference Gunes, I., Kaleli, C., Bilge, A., Polat, H.: Shilling attacks against recommender systems: a comprehensive survey. Artif. Intell. Rev. pp. 1–33 (2012) Gunes, I., Kaleli, C., Bilge, A., Polat, H.: Shilling attacks against recommender systems: a comprehensive survey. Artif. Intell. Rev. pp. 1–33 (2012)
5.
go back to reference Mehta, B.: Unsupervised shilling detection for collaborative filtering. Assoc. Adv. Artif. Intell. (2007) Mehta, B.: Unsupervised shilling detection for collaborative filtering. Assoc. Adv. Artif. Intell. (2007)
6.
go back to reference Mehta, B., Hofmann, T., Fankhauser, P.: Lies and propaganda: detecting spam users in collaborative filtering. In: IUI 2007: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 14–21 (2007) Mehta, B., Hofmann, T., Fankhauser, P.: Lies and propaganda: detecting spam users in collaborative filtering. In: IUI 2007: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 14–21 (2007)
7.
go back to reference Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User-Adap. Inter. 19, 65–97 (2009)CrossRef Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User-Adap. Inter. 19, 65–97 (2009)CrossRef
8.
go back to reference Morid, M., Shajari, M.: Defending recommender systems by influence analysis. Information Retrieval 17, 137–152 (2014)CrossRef Morid, M., Shajari, M.: Defending recommender systems by influence analysis. Information Retrieval 17, 137–152 (2014)CrossRef
9.
go back to reference Saleh, A., Desouky, A., Ali, S.: Promoting the performance of vertical recommendation systems by applying new classification techniques. Knowl.-Based Syst. 75, 192–223 (2015)CrossRef Saleh, A., Desouky, A., Ali, S.: Promoting the performance of vertical recommendation systems by applying new classification techniques. Knowl.-Based Syst. 75, 192–223 (2015)CrossRef
10.
go back to reference Savage, D., Zhang, X., Yu, X., Chou, P.L., Wang, Q.: Detection of opinion spam based on anomalous rating deviation. Expert Syst. Appl. 42(22), 8650–8657 (2015)CrossRef Savage, D., Zhang, X., Yu, X., Chou, P.L., Wang, Q.: Detection of opinion spam based on anomalous rating deviation. Expert Syst. Appl. 42(22), 8650–8657 (2015)CrossRef
11.
go back to reference Seminario, C., Wilson, D.: Assessing impacts of a power user attack on a matrix factorization collaborative recommender system. In: Florida Artificial Intelligence Research Society Conference (2014) Seminario, C., Wilson, D.: Assessing impacts of a power user attack on a matrix factorization collaborative recommender system. In: Florida Artificial Intelligence Research Society Conference (2014)
12.
go back to reference Seminario, C., Wilson, D.: Attacking item-based recommender systems with power items. In: ACM Conference on Recommender Systems, pp. 57–64 (2014) Seminario, C., Wilson, D.: Attacking item-based recommender systems with power items. In: ACM Conference on Recommender Systems, pp. 57–64 (2014)
13.
go back to reference Su, X., Zeng, H., Chen, Z.: Finding group shilling in recommendation system. In: WWW, pp. 960–961 (2005) Su, X., Zeng, H., Chen, Z.: Finding group shilling in recommendation system. In: WWW, pp. 960–961 (2005)
14.
go back to reference Wang, Y., Zhang, L., Tao, H., Wu, Z., Cao, J.: A comparative study of shilling attack detectors for recommender systems. In: The 12th International Conference on Service Systems and Service Management (ICSSSM), pp. 1–6 (2015) Wang, Y., Zhang, L., Tao, H., Wu, Z., Cao, J.: A comparative study of shilling attack detectors for recommender systems. In: The 12th International Conference on Service Systems and Service Management (ICSSSM), pp. 1–6 (2015)
15.
go back to reference Williams, C., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. SOCA 1, 157–170 (2007)CrossRef Williams, C., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. SOCA 1, 157–170 (2007)CrossRef
16.
go back to reference Williams, C., Mobasher, B., Burke, R., Bhaumik, R.: Detecting profile injection attacks in collaborative filtering: a classification-based approach. In: Advances in Web Mining and Web Usage Analysis, pp. 167–186 (2007) Williams, C., Mobasher, B., Burke, R., Bhaumik, R.: Detecting profile injection attacks in collaborative filtering: a classification-based approach. In: Advances in Web Mining and Web Usage Analysis, pp. 167–186 (2007)
17.
go back to reference Wu, Z., Wang, Y., Cao, J.: A survey on shilling attack models and detection techniques for recommender systems. Sci. China 59(7), 551–560 (2014) Wu, Z., Wang, Y., Cao, J.: A survey on shilling attack models and detection techniques for recommender systems. Sci. China 59(7), 551–560 (2014)
18.
go back to reference Xia, H., Fang, B., Gao, M., Ma, H., Tang, Y., Wen, J.: A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf. Sci. 306, 150–165 (2015)CrossRef Xia, H., Fang, B., Gao, M., Ma, H., Tang, Y., Wen, J.: A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf. Sci. 306, 150–165 (2015)CrossRef
19.
go back to reference Xu, M., Zhu, J.: Discriminative infinite latent feature models. In: Proceedings of the 1st IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP 2013), pp. 184–188 (2013) Xu, M., Zhu, J.: Discriminative infinite latent feature models. In: Proceedings of the 1st IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP 2013), pp. 184–188 (2013)
20.
go back to reference Xu, M., Zhu, J., Zhang, B.: Nonparametric max-margin matrix factorization for collaborative prediction. In: Advances in Neural Information Processing Systems (NIPS 2012), pp. 64–72 (2012) Xu, M., Zhu, J., Zhang, B.: Nonparametric max-margin matrix factorization for collaborative prediction. In: Advances in Neural Information Processing Systems (NIPS 2012), pp. 64–72 (2012)
21.
go back to reference Xu, M., Zhu, J., Zhang, B.: Fast max-margin matrix factorization with data augmentation. In: Proceedings of the 30th International Conference on Machine Learning, vol. 28, 3, pp. 978–986 (2013) Xu, M., Zhu, J., Zhang, B.: Fast max-margin matrix factorization with data augmentation. In: Proceedings of the 30th International Conference on Machine Learning, vol. 28, 3, pp. 978–986 (2013)
22.
go back to reference Zhang, F., Zhou, Q.: A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems. J. Comput. 7(1), 226–234 (2012) Zhang, F., Zhou, Q.: A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems. J. Comput. 7(1), 226–234 (2012)
23.
go back to reference Zhang, F., Zhou, Q.: HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl.-Based Syst. (2014) Zhang, F., Zhou, Q.: HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl.-Based Syst. (2014)
24.
go back to reference Zhang, X., Lee, T.M.D., Pitsilis, G.: Securing recommender systems against shilling attacks using social-based clustering. J. Comput. Sci. Technol. 28, 616–624 (2013)CrossRef Zhang, X., Lee, T.M.D., Pitsilis, G.: Securing recommender systems against shilling attacks using social-based clustering. J. Comput. Sci. Technol. 28, 616–624 (2013)CrossRef
25.
go back to reference Zhang, Z., Kulkarni, S.: Graph-based detection of shilling attacks in recommender systems. In: IEEE International Workshop on Machine Learning for, Signal Processing, pp. 1–6 (2013) Zhang, Z., Kulkarni, S.: Graph-based detection of shilling attacks in recommender systems. In: IEEE International Workshop on Machine Learning for, Signal Processing, pp. 1–6 (2013)
26.
go back to reference Zhang, Z., Kulkarni, S.R.: Detection of shilling attacks in recommender systems via spectral clustering. In: International Conference on Information Fusion, pp. 1–8 (2014) Zhang, Z., Kulkarni, S.R.: Detection of shilling attacks in recommender systems via spectral clustering. In: International Conference on Information Fusion, pp. 1–8 (2014)
27.
go back to reference Zhou, W., Koh, Y.S., Wen, J.H., Burki, S., Dobbie, G.: Detection of abnormal profiles on group attacks in recommender systems. In: Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, pp. 955–958 (2014) Zhou, W., Koh, Y.S., Wen, J.H., Burki, S., Dobbie, G.: Detection of abnormal profiles on group attacks in recommender systems. In: Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, pp. 955–958 (2014)
28.
go back to reference Zhou, W., Wen, J., Koh, Y.S., Alam, S., Dobbie, G.: Attack detection in recommender systems based on target item analysis. In: International Joint Conference on Neural Networks (IJCNN) (2014) Zhou, W., Wen, J., Koh, Y.S., Alam, S., Dobbie, G.: Attack detection in recommender systems based on target item analysis. In: International Joint Conference on Neural Networks (IJCNN) (2014)
29.
go back to reference Zhou, W., Wen, J., Koh, Y.S., Xiong, Q., Gao, M., Dobbie, G., Alam, S.: Shilling attacks detection in recommender systems based on target item analysis. PloS one (2015) Zhou, W., Wen, J., Koh, Y.S., Xiong, Q., Gao, M., Dobbie, G., Alam, S.: Shilling attacks detection in recommender systems based on target item analysis. PloS one (2015)
Metadata
Title
Detecting Anomalous Ratings Using Matrix Factorization for Recommender Systems
Authors
Zhihai Yang
Zhongmin Cai
Xinyuan Chen
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-39958-4_1