Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

Meta-Path and Matrix Factorization Based Shilling Detection for Collaborate Filtering

verfasst von : Xin Zhang, Hong Xiang, Yuqi Song

Erschienen in: Collaborative Computing: Networking, Applications and Worksharing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, collaborative filtering methods have been widely applied to E-commerce platforms. However, due to its openness, a large number of spammers attack those systems to manipulate the recommendation results to earn huge profits. The shilling attack has become a major threat to collaborative filtering systems. Therefore, effectively detecting shilling attacks is a crucial task. Most existing detection methods based on statistical-based features or unsupervised methods rely on a priori knowledge about attack size. Besides, the majority of work focuses on rating attack and ignore the relation attack. In this paper, motivated by the success of heterogeneous information network and oriented towards the hybrid attack, we propose an approach DMD to detect shilling attack based on meta-path and matrix factorization. At first, we concatenate the user-item bipartite network and user-user relation network as a whole. Next, we design several meta-paths to guide the random walk to product node sequences and utilize the skip-gram model to generate user embeddings. Meanwhile, users’ latent factors are decomposed by matrix factorization. Finally, we incorporate these embeddings and factors to joint train the detector. Extensive experimental analysis on two public datasets demonstrate the superiority of the proposed method and show the effectiveness of different attack strategies and various attack sizes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bhaumik, R., Williams, C., Mobasher, B., Burke, R.: Securing collaborative filtering against malicious attacks through anomaly detection. In: Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization (ITWP 2006), Boston, vol. 6, p. 10 (2006) Bhaumik, R., Williams, C., Mobasher, B., Burke, R.: Securing collaborative filtering against malicious attacks through anomaly detection. In: Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization (ITWP 2006), Boston, vol. 6, p. 10 (2006)
2.
Zurück zum Zitat Hurley, N., Cheng, Z., Zhang, M.: Statistical attack detection. In: Proceedings of the third ACM Conference on Recommender Systems, pp. 149–156. ACM (2009) Hurley, N., Cheng, Z., Zhang, M.: Statistical attack detection. In: Proceedings of the third ACM Conference on Recommender Systems, pp. 149–156. ACM (2009)
3.
Zurück zum Zitat Chirita, P.-A., Nejdl, W., Zamfir, C.: Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th Annual ACM International Workshop on Web Information and Data Management, pp. 67–74. ACM (2005) Chirita, P.-A., Nejdl, W., Zamfir, C.: Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th Annual ACM International Workshop on Web Information and Data Management, pp. 67–74. ACM (2005)
4.
Zurück zum Zitat Williams, C., Mobasher, B.: Profile injection attack detection for securing collaborative recommender systems. DePaul University CTI Technical Report, pp. 1–47 (2006) Williams, C., Mobasher, B.: Profile injection attack detection for securing collaborative recommender systems. DePaul University CTI Technical Report, pp. 1–47 (2006)
5.
Zurück zum Zitat Williams, C.A., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. Serv. Oriented Comput. Appl. 1(3), 157–170 (2007)CrossRef Williams, C.A., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. Serv. Oriented Comput. Appl. 1(3), 157–170 (2007)CrossRef
6.
Zurück zum Zitat Li, W., Gao, M., Li, H., Xiong, Q., Wen, J., Ling, B.: A shilling attack detection algorithm based on popularity degree features. Acta Autom. Sinica 41(9), 1563–1576 (2015) Li, W., Gao, M., Li, H., Xiong, Q., Wen, J., Ling, B.: A shilling attack detection algorithm based on popularity degree features. Acta Autom. Sinica 41(9), 1563–1576 (2015)
7.
Zurück zum Zitat Zhou, W., Wen, J., Xiong, Q., Gao, M., Zeng, J.: SVM-TIA a shilling attack detection method based on svm and target item analysis in recommender systems. Neurocomputing 210, 197–205 (2016)CrossRef Zhou, W., Wen, J., Xiong, Q., Gao, M., Zeng, J.: SVM-TIA a shilling attack detection method based on svm and target item analysis in recommender systems. Neurocomputing 210, 197–205 (2016)CrossRef
8.
Zurück zum Zitat Dou, T., Yu, J., Xiong, Q., Gao, M., Song, Y., Fang, Q.: Collaborative shilling detection bridging factorization and user embedding. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds.) CollaborateCom 2017. LNICST, vol. 252, pp. 459–469. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00916-8_43CrossRef Dou, T., Yu, J., Xiong, Q., Gao, M., Song, Y., Fang, Q.: Collaborative shilling detection bridging factorization and user embedding. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds.) CollaborateCom 2017. LNICST, vol. 252, pp. 459–469. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-030-00916-8_​43CrossRef
9.
Zurück zum Zitat Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User-Adap. Interact. 19(1–2), 65–97 (2009)CrossRef Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User-Adap. Interact. 19(1–2), 65–97 (2009)CrossRef
10.
Zurück zum Zitat Zhang, Y., Tan, Y., Zhang, M., Liu, Y., Chua, T.-S., Ma, S.: Catch the black sheep: Unified framework for shilling attack detection based on fraudulent action propagation. In: IJCAI, pp. 2408–2414 (2015) Zhang, Y., Tan, Y., Zhang, M., Liu, Y., Chua, T.-S., Ma, S.: Catch the black sheep: Unified framework for shilling attack detection based on fraudulent action propagation. In: IJCAI, pp. 2408–2414 (2015)
11.
Zurück zum Zitat Wu, Z., Wu, J., Cao, J., Tao, D.: HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985–993. ACM (2012) Wu, Z., Wu, J., Cao, J., Tao, D.: HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985–993. ACM (2012)
12.
Zurück zum Zitat Wu, Z., Wang, Y., Wang, Y., Wu, J., Cao, J., Zhang, L.: Spammers detection from product reviews: a hybrid model. In: 2015 IEEE International Conference on Data Mining (ICDM), pp. 1039–1044. IEEE (2015) Wu, Z., Wang, Y., Wang, Y., Wu, J., Cao, J., Zhang, L.: Spammers detection from product reviews: a hybrid model. In: 2015 IEEE International Conference on Data Mining (ICDM), pp. 1039–1044. IEEE (2015)
13.
Zurück zum Zitat Junliang, Y., Gao, M., Rong, W., Li, W., Xiong, Q., Wen, J.: Hybrid attacks on model-based social recommender systems. Phys. A: Stati. Mech. Appl. 483, 171–181 (2017)CrossRef Junliang, Y., Gao, M., Rong, W., Li, W., Xiong, Q., Wen, J.: Hybrid attacks on model-based social recommender systems. Phys. A: Stati. Mech. Appl. 483, 171–181 (2017)CrossRef
14.
Zurück zum Zitat Yuan, Q., Chen, L., Zhao, S.: Factorization vs. regularization: fusing heterogeneous social relationships in top-n recommendation. In: Proceedings of the fifth ACM Conference on Recommender Systems, pp. 245–252. ACM (2011) Yuan, Q., Chen, L., Zhao, S.: Factorization vs. regularization: fusing heterogeneous social relationships in top-n recommendation. In: Proceedings of the fifth ACM Conference on Recommender Systems, pp. 245–252. ACM (2011)
15.
Zurück zum Zitat Dong, Y., Chawla, N.V., Swami, A.: metapath2vec: scalable representation learning for heterogeneous networks. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 135–144. ACM (2017) Dong, Y., Chawla, N.V., Swami, A.: metapath2vec: scalable representation learning for heterogeneous networks. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 135–144. ACM (2017)
16.
Zurück zum Zitat Song, Y., Gao, M., Yu, J., Xiong, Q.: Social recommendation based on implicit friends discovering via meta-path. In: Proceedings of the 30th International Conference on Tools with Artifical Intelligence (2018) Song, Y., Gao, M., Yu, J., Xiong, Q.: Social recommendation based on implicit friends discovering via meta-path. In: Proceedings of the 30th International Conference on Tools with Artifical Intelligence (2018)
17.
Zurück zum Zitat Sun, Y., Han, J.: Mining heterogeneous information networks: principles and methodologies. Synth. Lect. Data Min. Knowl. Discov. 3(2), 1–159 (2012)CrossRef Sun, Y., Han, J.: Mining heterogeneous information networks: principles and methodologies. Synth. Lect. Data Min. Knowl. Discov. 3(2), 1–159 (2012)CrossRef
18.
Zurück zum Zitat Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701–710. ACM (2014) Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701–710. ACM (2014)
19.
Zurück zum Zitat Sun, Y., Han, J., Yan, X., Yu, P.S., Wu, T.: PathSim: meta path-based top-k similarity search in heterogeneous information networks. Proc. VLDB Endow. 4(11), 992–1003 (2011) Sun, Y., Han, J., Yan, X., Yu, P.S., Wu, T.: PathSim: meta path-based top-k similarity search in heterogeneous information networks. Proc. VLDB Endow. 4(11), 992–1003 (2011)
20.
Zurück zum Zitat Hirsch, J.E.: An index to quantify an individual’s scientific research output. Proc. Nat. Acad. Sci. 102(46), 16569–16572 (2005)CrossRef Hirsch, J.E.: An index to quantify an individual’s scientific research output. Proc. Nat. Acad. Sci. 102(46), 16569–16572 (2005)CrossRef
21.
Zurück zum Zitat Lü, L., Zhou, T., Zhang, Q.-M., Stanley, H.E.: The h-index of a network node and its relation to degree and coreness. Nat. commun. 7, 10168 (2016)CrossRef Lü, L., Zhou, T., Zhang, Q.-M., Stanley, H.E.: The h-index of a network node and its relation to degree and coreness. Nat. commun. 7, 10168 (2016)CrossRef
22.
Zurück zum Zitat Dorogovtsev, S.N., Goltsev, A.V., Mendes, J.F.F.: K-core organization of complex networks. Phys. Rev. Lett. 96(4), 040601 (2006)CrossRef Dorogovtsev, S.N., Goltsev, A.V., Mendes, J.F.F.: K-core organization of complex networks. Phys. Rev. Lett. 96(4), 040601 (2006)CrossRef
23.
Zurück zum Zitat Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111–3119 (2013) Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111–3119 (2013)
24.
Zurück zum Zitat Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 8, 30–37 (2009)CrossRef Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 8, 30–37 (2009)CrossRef
25.
Zurück zum Zitat Liaw, A., Wiener, M., et al.: Classification and regression by randomforest. R news 2(3), 18–22 (2002) Liaw, A., Wiener, M., et al.: Classification and regression by randomforest. R news 2(3), 18–22 (2002)
26.
Zurück zum Zitat Xu, C., Zhang, J., Chang, K., Long, C.: Uncovering collusive spammers in Chinese review websites. In: Proceedings of the 22nd ACM International Conference on Conference on Information and Knowledge Management, pp. 979–988. ACM (2013) Xu, C., Zhang, J., Chang, K., Long, C.: Uncovering collusive spammers in Chinese review websites. In: Proceedings of the 22nd ACM International Conference on Conference on Information and Knowledge Management, pp. 979–988. ACM (2013)
27.
Zurück zum Zitat Guo, G., Zhang, J., Yorke-Smith, N.: A novel Bayesian similarity measure for recommender systems. In: IJCAI, pp. 2619–2625 (2013) Guo, G., Zhang, J., Yorke-Smith, N.: A novel Bayesian similarity measure for recommender systems. In: IJCAI, pp. 2619–2625 (2013)
28.
Zurück zum Zitat Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6), 729–748 (2013)CrossRef Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6), 729–748 (2013)CrossRef
Metadaten
Titel
Meta-Path and Matrix Factorization Based Shilling Detection for Collaborate Filtering
verfasst von
Xin Zhang
Hong Xiang
Yuqi Song
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-12981-1_1

Neuer Inhalt