Skip to main content
Erschienen in: Discover Computing 2/2014

01.04.2014

Defending recommender systems by influence analysis

verfasst von: Mohammad Amin Morid, Mehdi Shajari, Ali Reza Hashemi

Erschienen in: Discover Computing | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Collaborative filtering (CF) is a popular method for personalizing product recommendations for e-commerce applications. In order to recommend a product to a user and predict that user’s preference, CF utilizes product evaluation ratings of like-minded users. The process of finding like-minded users forms a social network among all users and each link between two users represents an implicit connection between them. Users having more connections with others are the most influential users. Attacking recommender systems is a new issue for these systems. Here, an attacker tries to manipulate a recommender system in order to change the recommendation output according to her wish. If an attacker succeeds, her profile is used over and over again by the recommender system, making her an influential user. In this study, we applied the established attack detection methods to the influential users, instead of the whole user set, to improve their attack detection performance. Experiments were conducted using the same settings previously used to test the established methods. The results showed that the proposed influence-based method had better detection performance and improved the stability of a recommender system for most attack scenarios. It performed considerably better than established detection methods for attacks that inserted low numbers of attack profiles (20–25 %).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Adomavicius, G., & Zhang, J. (2010). On the stability of recommendation algorithms. In Proceedings of the fourth ACM conference on recommender systems, pp. 47–54. Adomavicius, G., & Zhang, J. (2010). On the stability of recommendation algorithms. In Proceedings of the fourth ACM conference on recommender systems, pp. 47–54.
Zurück zum Zitat Ahn, H. J., Kanga, H., & Lee, J. (2010). Selecting a small number of products for effective user profiling in collaborative filtering. Expert Systems with Applications, 37(4), 3055–3062.CrossRef Ahn, H. J., Kanga, H., & Lee, J. (2010). Selecting a small number of products for effective user profiling in collaborative filtering. Expert Systems with Applications, 37(4), 3055–3062.CrossRef
Zurück zum Zitat Avesani, P., Massa, P., Tiella, R., (2005). A trust-enhanced recommender system application: Moleskiing. In SAC’05: Proceedings of the. (2005). ACM symposium on Applied computing (pp. 1589–1593). New York: NY, USA. Avesani, P., Massa, P., Tiella, R., (2005). A trust-enhanced recommender system application: Moleskiing. In SAC’05: Proceedings of the. (2005). ACM symposium on Applied computing (pp. 1589–1593). New York: NY, USA.
Zurück zum Zitat Bryan, K., O’mahony, M., & Cunningham, P. (2008). Unsupervised retrieval of attack profiles in collaborative recommender systems. In Proceedings of the 2008 ACM conference on recommender systems. Bryan, K., O’mahony, M., & Cunningham, P. (2008). Unsupervised retrieval of attack profiles in collaborative recommender systems. In Proceedings of the 2008 ACM conference on recommender systems.
Zurück zum Zitat Burke, R., Mobasher, B., & Bhaumik, R. (2005). Limited knowledge shilling attacks in collaborative filtering systems. In Proceedings of the 3rd IJCAI workshop in intelligent techniques for personalization. Edinburgh, Scotland. Burke, R., Mobasher, B., & Bhaumik, R. (2005). Limited knowledge shilling attacks in collaborative filtering systems. In Proceedings of the 3rd IJCAI workshop in intelligent techniques for personalization. Edinburgh, Scotland.
Zurück zum Zitat Burke, R., Mobasher, B., Williams, C., & Bhaumik, R. (2006). Classification features for attack detection in collaborative recommender systems. In Proceedings of the ACM SIGKDD conference on knowledge discovery and data mining (KDD’06). Burke, R., Mobasher, B., Williams, C., & Bhaumik, R. (2006). Classification features for attack detection in collaborative recommender systems. In Proceedings of the ACM SIGKDD conference on knowledge discovery and data mining (KDD’06).
Zurück zum Zitat Chirita, P., Nejdl, W. & Zamfir, C. (2005). Preventing shilling attacks in online recommender systems, In Proceedings of the 7th annual ACM international workshop on Web information and data management. Chirita, P., Nejdl, W. & Zamfir, C. (2005). Preventing shilling attacks in online recommender systems, In Proceedings of the 7th annual ACM international workshop on Web information and data management.
Zurück zum Zitat Herlocker, J., Konstan, J., Borchers, A., & Riedl, J. (1999). An algorithmic framework for performing collaborative filtering. In Proceedings of the 22nd ACM conference on research and development in information retrieval (SIGIR’99). Berkeley, CA. Herlocker, J., Konstan, J., Borchers, A., & Riedl, J. (1999). An algorithmic framework for performing collaborative filtering. In Proceedings of the 22nd ACM conference on research and development in information retrieval (SIGIR’99). Berkeley, CA.
Zurück zum Zitat Herlocker, J., Konstan, J., Tervin, L. G., & Riedl, J. (2004). Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems, 22(1), 5–53.CrossRef Herlocker, J., Konstan, J., Tervin, L. G., & Riedl, J. (2004). Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems, 22(1), 5–53.CrossRef
Zurück zum Zitat Jamali, M., & Ester, M. (2009). Trustwalker: A random walk model for combining trust-based and item-based recommendation. In Proceeding of KDD’09, 397–406. Jamali, M., & Ester, M. (2009). Trustwalker: A random walk model for combining trust-based and item-based recommendation. In Proceeding of KDD’09, 397–406.
Zurück zum Zitat Jamali, M., & Ester, M. (2010). A matrix factorization technique with trust propagation for recommendation in social networks. In Proceeding of RecSys, 2010, 135–142. Jamali, M., & Ester, M. (2010). A matrix factorization technique with trust propagation for recommendation in social networks. In Proceeding of RecSys, 2010, 135–142.
Zurück zum Zitat Kim, J. W., Lee, B. H., Shaw, M. J., Chang, H., & Nelson, M. (2001). Application of decision tree induction techniques to personalized advertisements on Internet storefront. International Journal of Electronic Commerce, 5(3), 45–62. Kim, J. W., Lee, B. H., Shaw, M. J., Chang, H., & Nelson, M. (2001). Application of decision tree induction techniques to personalized advertisements on Internet storefront. International Journal of Electronic Commerce, 5(3), 45–62.
Zurück zum Zitat Kolbe, D., Zhu, Q., & Pramanik, S. (2010). Efficient k-nearest neighbor searching in non-ordered discrete data spaces. ACM Transactions on Information Systems, 28(2). Kolbe, D., Zhu, Q., & Pramanik, S. (2010). Efficient k-nearest neighbor searching in non-ordered discrete data spaces. ACM Transactions on Information Systems, 28(2).
Zurück zum Zitat Lam, S. & Riedl, J. (2004). Shilling recommender systems for fun and profit. In Proceedings of the 13th international conference on world wide web. Lam, S. & Riedl, J. (2004). Shilling recommender systems for fun and profit. In Proceedings of the 13th international conference on world wide web.
Zurück zum Zitat Lang, J., Spear, M., & Wu, S. F. (2010). Social manipulation of online recommender systems. In Proceedings of the 2nd international conference on social informatics, Laxenburg, Austria. Lang, J., Spear, M., & Wu, S. F. (2010). Social manipulation of online recommender systems. In Proceedings of the 2nd international conference on social informatics, Laxenburg, Austria.
Zurück zum Zitat Li, Y. K., & Lui, J. C. S. (2011). Friends or foes: Detecting dishonest recommenders in online social networks. In IEEE 20th international conference on computer communication networks (ICCCN). Li, Y. K., & Lui, J. C. S. (2011). Friends or foes: Detecting dishonest recommenders in online social networks. In IEEE 20th international conference on computer communication networks (ICCCN).
Zurück zum Zitat Li, Q., Wang, J., Chen, Y., & Lin, Zh. (2010). User comments for news recommendation in forum-based social media. Information Sciences, 180(24), 4929–4939.CrossRef Li, Q., Wang, J., Chen, Y., & Lin, Zh. (2010). User comments for news recommendation in forum-based social media. Information Sciences, 180(24), 4929–4939.CrossRef
Zurück zum Zitat Liu, D., Lai, Ch., & Lee, W. (2009). A hybrid of sequential rules and collaborative filtering for product recommendation. Information Sciences, 179(20), 3505–3519.CrossRef Liu, D., Lai, Ch., & Lee, W. (2009). A hybrid of sequential rules and collaborative filtering for product recommendation. Information Sciences, 179(20), 3505–3519.CrossRef
Zurück zum Zitat Liu, F., & Lee, H. (2010). Use of social network information to enhance collaborative filtering performance. Expert Systems with Applications, 37(7), 4772–4778.CrossRef Liu, F., & Lee, H. (2010). Use of social network information to enhance collaborative filtering performance. Expert Systems with Applications, 37(7), 4772–4778.CrossRef
Zurück zum Zitat Massa, P., & Avesani, P. (2007). Trust-aware recommender systems, In Proceedings of the 2007 ACM conference on Recommender systems (pp. 17–24). New York: USA.CrossRef Massa, P., & Avesani, P. (2007). Trust-aware recommender systems, In Proceedings of the 2007 ACM conference on Recommender systems (pp. 17–24). New York: USA.CrossRef
Zurück zum Zitat Mobasher, B., Burke, R., Williams, C. & Bhaumik, R. (2006). Analysis and detection of segment-focused attacks against collaborative recommendation. In Lecture notes in computer science: Proceedings of the. (2005). WebKDD workshop. Heidelberg: Springer. Mobasher, B., Burke, R., Williams, C. & Bhaumik, R. (2006). Analysis and detection of segment-focused attacks against collaborative recommendation. In Lecture notes in computer science: Proceedings of the. (2005). WebKDD workshop. Heidelberg: Springer.
Zurück zum Zitat Mobasher, B., Burke, R., Bhaumik, R., & Williams, C. (2007). Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 7(4), 1–23.CrossRef Mobasher, B., Burke, R., Bhaumik, R., & Williams, C. (2007). Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 7(4), 1–23.CrossRef
Zurück zum Zitat Morid, M.A., Shajari, M., & Hashemi, A. R. (2011). Who are the most influential users in a recommender system? In Proceedings of the 13th international conference on electronic commerce, August 3–5, Liverpool, England. Morid, M.A., Shajari, M., & Hashemi, A. R. (2011). Who are the most influential users in a recommender system? In Proceedings of the 13th international conference on electronic commerce, August 3–5, Liverpool, England.
Zurück zum Zitat O’mahony, M., Hurley, N., Kushmerick, N., & Silvestre, G. (2004). Collaborative recommendation: A robustness analysis. ACM Transactions on Internet Technology, 4(4), 344–377.CrossRef O’mahony, M., Hurley, N., Kushmerick, N., & Silvestre, G. (2004). Collaborative recommendation: A robustness analysis. ACM Transactions on Internet Technology, 4(4), 344–377.CrossRef
Zurück zum Zitat Rashid, A. M. (2007). Mining Influence in Recommender Systems. Ph.D: Dissertation, University of MINNESOTA, USA. Rashid, A. M. (2007). Mining Influence in Recommender Systems. Ph.D: Dissertation, University of MINNESOTA, USA.
Zurück zum Zitat Rashid, A. M., & Karypis, G. (2005). & Riedl, J. Influence in Ratings-Based Recommender Systems: An Algorithm-Independent Approach. Proceedings of SIAM International Conference on Data Mining. Rashid, A. M., & Karypis, G. (2005). & Riedl, J. Influence in Ratings-Based Recommender Systems: An Algorithm-Independent Approach. Proceedings of SIAM International Conference on Data Mining.
Zurück zum Zitat Rashid, A. M., Karypis, G., & Riedl, J. (2008). Learning Preferences of New Users in Recommender Systems: An Information Theoretic Approach. Las Vegas, Nevada, USA: Web Mining and Web Usage Analysis. Rashid, A. M., Karypis, G., & Riedl, J. (2008). Learning Preferences of New Users in Recommender Systems: An Information Theoretic Approach. Las Vegas, Nevada, USA: Web Mining and Web Usage Analysis.
Zurück zum Zitat Sandvig, J., Mobasher, B., & Burke, R. (2007). Robustness of collaborative recommendation based on association rule mining. In Proceedings of the 2007 ACM conference on recommender systems. Sandvig, J., Mobasher, B., & Burke, R. (2007). Robustness of collaborative recommendation based on association rule mining. In Proceedings of the 2007 ACM conference on recommender systems.
Zurück zum Zitat Sarwar, B., Karypis, G., Konstan, J., & Riedl, J. (2001). Item-based collaborative filtering recommendation algorithms. In Proceedings of the WWW10, Hong Kong, pp. 285–295 Sarwar, B., Karypis, G., Konstan, J., & Riedl, J. (2001). Item-based collaborative filtering recommendation algorithms. In Proceedings of the WWW10, Hong Kong, pp. 285–295
Zurück zum Zitat Su, J., Wang, B., Hsiao, Ch., & Tseng, V. (2010). Personalized rough-set-based recommendation by integrating multiple contents and collaborative information. Information Sciences, 180(1), 113–131.CrossRef Su, J., Wang, B., Hsiao, Ch., & Tseng, V. (2010). Personalized rough-set-based recommendation by integrating multiple contents and collaborative information. Information Sciences, 180(1), 113–131.CrossRef
Zurück zum Zitat Teevan, J., Dumais, S., & Horvitz, E. (2010). Potential for personalization. ACM Transactions on Computer-Human Interaction, 17(4), 1–31.CrossRef Teevan, J., Dumais, S., & Horvitz, E. (2010). Potential for personalization. ACM Transactions on Computer-Human Interaction, 17(4), 1–31.CrossRef
Zurück zum Zitat Weinberger, K., & Saul, L. (2009). Distance metric learning for large margin nearest neighbor classification. The Journal of Machine Learning Research, 10, 207–244.MATH Weinberger, K., & Saul, L. (2009). Distance metric learning for large margin nearest neighbor classification. The Journal of Machine Learning Research, 10, 207–244.MATH
Zurück zum Zitat Weiwei, Y., Donghai, G., Young-koo, L., Sungyoung, L., & Sung, J. H. (2010). Improved trust-aware recommender system using small-worldness of trust networks. Knowledge-Based Systems, Elsevier, 23(3), 232–238.CrossRef Weiwei, Y., Donghai, G., Young-koo, L., Sungyoung, L., & Sung, J. H. (2010). Improved trust-aware recommender system using small-worldness of trust networks. Knowledge-Based Systems, Elsevier, 23(3), 232–238.CrossRef
Zurück zum Zitat Williams, C. A., Mobasher, B., & Burke, R. (2007). Defending recommender systems: Detection of profile injection attacks. Service Oriented Computing and Applications, 4(3), 157–170.CrossRef Williams, C. A., Mobasher, B., & Burke, R. (2007). Defending recommender systems: Detection of profile injection attacks. Service Oriented Computing and Applications, 4(3), 157–170.CrossRef
Zurück zum Zitat Yu, D., Yu, X., Hu, Q., Liu, J., & Wu, A. (2011). Dynamic time warping constraint learning for large margin nearest neighbor classification. Information Sciences, 181(13), 2787–2796.CrossRef Yu, D., Yu, X., Hu, Q., Liu, J., & Wu, A. (2011). Dynamic time warping constraint learning for large margin nearest neighbor classification. Information Sciences, 181(13), 2787–2796.CrossRef
Zurück zum Zitat Zhang, F. (2009). Average shilling attack against trust-based recommender systems. International Conference on Information Management, Innovation Management and Industrial Engineering, 4, 588–591.CrossRef Zhang, F. (2009). Average shilling attack against trust-based recommender systems. International Conference on Information Management, Innovation Management and Industrial Engineering, 4, 588–591.CrossRef
Zurück zum Zitat Zhang, F. (2010). Analysis of love-hate shilling attack against e-commerce recommender system. International Conference of Information Science and Management Engineering (ISME), 4, 318–321. Zhang, F. (2010). Analysis of love-hate shilling attack against e-commerce recommender system. International Conference of Information Science and Management Engineering (ISME), 4, 318–321.
Metadaten
Titel
Defending recommender systems by influence analysis
verfasst von
Mohammad Amin Morid
Mehdi Shajari
Ali Reza Hashemi
Publikationsdatum
01.04.2014
Verlag
Springer Netherlands
Erschienen in
Discover Computing / Ausgabe 2/2014
Print ISSN: 2948-2984
Elektronische ISSN: 2948-2992
DOI
https://doi.org/10.1007/s10791-013-9224-5

Premium Partner