Skip to main content
Erschienen in: International Journal of Machine Learning and Cybernetics 9/2020

30.04.2020 | Original Article

Unsupervised and supervised methods for the detection of hurriedly created profiles in recommender systems

verfasst von: Costas Panagiotakis, Harris Papadakis, Paraskevi Fragopoulou

Erschienen in: International Journal of Machine Learning and Cybernetics | Ausgabe 9/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recommender systems try to provide users with accurate personalized suggestions for items based on an analysis of previous user decisions and the decisions made by other users. These systems suffer from profile injection attacks, where malicious profiles are generated in order to promote or demote a particular item introducing abnormal ratings. The problem of automatic detection of such malicious profiles has been recently addressed by a great number of authors in the literature using supervised and unsupervised approaches. In this paper, we propose a framework to identify anomalous rating profiles, where each attacker (outlier) hurriedly creates profiles that inject into the system an unspecified combination of random ratings and specific ratings, without any prior knowledge of the existing ratings. This attack is a superset of the two different attacks (Uniform and Delta) proposed in Harper et al. (ACM Trans Interact Intell Syst 5(4):19, 2016) making the attack model more realistic and its detection more challenging. The proposed detection method is based on several attributes related to the unpredictable behavior of the outliers in a validation set, on the user-item rating matrix, on the similarity between users and on the filler items. In this work, we propose a new attribute (RIS) to capture the randomness in item selection of the abnormal profiles. In this work, three different systems are proposed: (1) a probabilistic framework that estimates the probability of a user to be an outlier by combining several features in a completely unsupervised way. (2) An unsupervised clustering system based on the k-means algorithm that automatically spots the spurious profiles. (3) A supervised framework that uses a random forest classifier for cases where labeling sample data is available. Experimental results on the MovieLens and the Small Netflix datasets demonstrate the high performance of the proposed methods as well as the discrimination accuracy of the proposed features.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Fußnoten
1
On the opposite case, e.g. under RIS attribute, the \(1-CDF\) can be used.
 
2
\(\overline{w}(f) = \frac{w(f)}{\sum _{f'} w(f')}\)
 
3
The code implementing the proposed method together with the datasets and the experimental results is publicly available at https://​sites.​google.​com/​site/​costaspanagiotak​is/​research/​hurryattackrs.
 
4
The rest of the features proposed in [13] were not computed, since they use connections between users that are not available in our datasets.
 
Literatur
1.
Zurück zum Zitat Adomavicius G, Kwon Y (2012) Improving aggregate recommendation diversity using ranking-based techniques. IEEE Trans Knowl Data Eng 24(5):896–911 Adomavicius G, Kwon Y (2012) Improving aggregate recommendation diversity using ranking-based techniques. IEEE Trans Knowl Data Eng 24(5):896–911
2.
Zurück zum Zitat Adomavicius G, Tuzhilin A (2005) Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans Knowl Data Eng 17(6):734–749 Adomavicius G, Tuzhilin A (2005) Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans Knowl Data Eng 17(6):734–749
3.
Zurück zum Zitat Belgiu M, Drăguţ L (2016) Random forest in remote sensing: a review of applications and future directions. ISPRS J Photogramm Remote Sens 114:24–31 Belgiu M, Drăguţ L (2016) Random forest in remote sensing: a review of applications and future directions. ISPRS J Photogramm Remote Sens 114:24–31
4.
Zurück zum Zitat Bennett J, Lanning S, Netflix N (2007) The netflix prize. In: In KDD Cup and Workshop in conjunction with KDD Bennett J, Lanning S, Netflix N (2007) The netflix prize. In: In KDD Cup and Workshop in conjunction with KDD
6.
Zurück zum Zitat Burke R, Mobasher B, Williams C (2006) Classification features for attack detection in collaborative recommender systems. In: International conference on knowledge discovery and data mining, p 17–20 Burke R, Mobasher B, Williams C (2006) Classification features for attack detection in collaborative recommender systems. In: International conference on knowledge discovery and data mining, p 17–20
7.
Zurück zum Zitat Burke R, O’Mahony MP, Hurley NJ (2015) Robust collaborative recommendation. In: Recommender systems handbook, Springer, pp 961–995 Burke R, O’Mahony MP, Hurley NJ (2015) Robust collaborative recommendation. In: Recommender systems handbook, Springer, pp 961–995
8.
Zurück zum Zitat Cai H, Zhang F (2018) An unsupervised method for detecting shilling attacks in recommender systems by mining item relationship and identifying target items. Comput J 62(4):579–597MathSciNet Cai H, Zhang F (2018) An unsupervised method for detecting shilling attacks in recommender systems by mining item relationship and identifying target items. Comput J 62(4):579–597MathSciNet
9.
Zurück zum Zitat Cao J, Wu Z, Mao B, Zhang Y (2013) Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6):729–748 Cao J, Wu Z, Mao B, Zhang Y (2013) Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6):729–748
10.
Zurück zum Zitat Chen K, Chan PP, Zhang F, Li Q (2018) Shilling attack based on item popularity and rated item correlation against collaborative filtering. Int J Mach Learn Cybern 10:1–13 Chen K, Chan PP, Zhang F, Li Q (2018) Shilling attack based on item popularity and rated item correlation against collaborative filtering. Int J Mach Learn Cybern 10:1–13
11.
Zurück zum Zitat Chirita PA, Nejdl W, Zamfir C (2005) Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th annual ACM international workshop on Web information and data management, ACM, pp 67–74 Chirita PA, Nejdl W, Zamfir C (2005) Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th annual ACM international workshop on Web information and data management, ACM, pp 67–74
12.
Zurück zum Zitat Costa H, Macedo L (2013) Emotion-based recommender system for overcoming the problem of information overload. In: International conference on practical applications of agents and multi-agent systems, Springer, pp 178–189 Costa H, Macedo L (2013) Emotion-based recommender system for overcoming the problem of information overload. In: International conference on practical applications of agents and multi-agent systems, Springer, pp 178–189
13.
Zurück zum Zitat Davoudi A, Chatterjee M (2017) Detection of profile injection attacks in social recommender systems using outlier analysis. In: 2017 IEEE International conference on big data (Big Data), IEEE, pp 2714–2719 Davoudi A, Chatterjee M (2017) Detection of profile injection attacks in social recommender systems using outlier analysis. In: 2017 IEEE International conference on big data (Big Data), IEEE, pp 2714–2719
14.
Zurück zum Zitat Gorrell G (2006) Generalized hebbian algorithm for incremental singular value decomposition in natural language processing. In: EACL 2006, 11st Conference of the European chapter of the association for computational linguistics, proceedings of the conference Gorrell G (2006) Generalized hebbian algorithm for incremental singular value decomposition in natural language processing. In: EACL 2006, 11st Conference of the European chapter of the association for computational linguistics, proceedings of the conference
16.
Zurück zum Zitat Grinias I, Panagiotakis C, Tziritas G (2016) MRF-based segmentation and unsupervised classification for building and road detection in peri-urban areas of high-resolution satellite images. ISPRS J Photogramm Remote Sens 122:145–166 Grinias I, Panagiotakis C, Tziritas G (2016) MRF-based segmentation and unsupervised classification for building and road detection in peri-urban areas of high-resolution satellite images. ISPRS J Photogramm Remote Sens 122:145–166
17.
Zurück zum Zitat Gunawardana A, Shani G (2009) A survey of accuracy evaluation metrics of recommendation tasks. J Mach Learn Res 10(Dec):2935–2962MathSciNetMATH Gunawardana A, Shani G (2009) A survey of accuracy evaluation metrics of recommendation tasks. J Mach Learn Res 10(Dec):2935–2962MathSciNetMATH
18.
Zurück zum Zitat Harper FM, Konstan JA (2016) The movielens datasets: history and context. ACM Trans Interact Intell Syst 5(4):19 Harper FM, Konstan JA (2016) The movielens datasets: history and context. ACM Trans Interact Intell Syst 5(4):19
19.
20.
Zurück zum Zitat Herlocker JL, Konstan JA, Borchers A, Riedl J (1999) An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval, ACM, pp 230–237 Herlocker JL, Konstan JA, Borchers A, Riedl J (1999) An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd annual international ACM SIGIR conference on research and development in information retrieval, ACM, pp 230–237
21.
Zurück zum Zitat Jamali M, Ester M (2010) A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the fourth ACM conference on Recommender systems, ACM, pp 135–142 Jamali M, Ester M (2010) A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the fourth ACM conference on Recommender systems, ACM, pp 135–142
22.
Zurück zum Zitat Linden G, Smith B, York J (2003) Amazon.com recommendations: Item-to-item collaborative filtering. IEEE Internet Comput 7(1):76–80 Linden G, Smith B, York J (2003) Amazon.com recommendations: Item-to-item collaborative filtering. IEEE Internet Comput 7(1):76–80
24.
Zurück zum Zitat Mobasher B, Burke RD, Sandvig JJ (2006) Model-based collaborative filtering as a defense against profile injection attacks. In: Proceedings, The twenty-first national conference on artificial intelligence and the eighteenth innovative applications of artificial intelligence conference Mobasher B, Burke RD, Sandvig JJ (2006) Model-based collaborative filtering as a defense against profile injection attacks. In: Proceedings, The twenty-first national conference on artificial intelligence and the eighteenth innovative applications of artificial intelligence conference
25.
Zurück zum Zitat O’Sullivan D, Wilson D, Smyth B (2002) Improving case-based recommendation. In: European conference on case-based reasoning, Springer, pp 278–291 O’Sullivan D, Wilson D, Smyth B (2002) Improving case-based recommendation. In: European conference on case-based reasoning, Springer, pp 278–291
26.
27.
Zurück zum Zitat Panagiotakis C, Papadakis H, Fragopoulou P (2018) Detection of hurriedly created abnormal profiles in recommender systems. In: International conference on intelligent systems Panagiotakis C, Papadakis H, Fragopoulou P (2018) Detection of hurriedly created abnormal profiles in recommender systems. In: International conference on intelligent systems
28.
Zurück zum Zitat Panagiotakis C, Papadakis H, Grinias E, Komodakis N, Fragopoulou P, Tziritas G (2013) Interactive image segmentation based on synthetic graph coordinates. Pattern Recognit 46(11):2940–2952 Panagiotakis C, Papadakis H, Grinias E, Komodakis N, Fragopoulou P, Tziritas G (2013) Interactive image segmentation based on synthetic graph coordinates. Pattern Recognit 46(11):2940–2952
29.
Zurück zum Zitat Papadakis H, Panagiotakis C, Fragopoulou P (2014) Distributed detection of communities in complex networks using synthetic coordinates. J Stat Mech Theory Exp 2014(3):P03013 Papadakis H, Panagiotakis C, Fragopoulou P (2014) Distributed detection of communities in complex networks using synthetic coordinates. J Stat Mech Theory Exp 2014(3):P03013
30.
Zurück zum Zitat Papadakis H, Panagiotakis C, Fragopoulou P (2017) SCoR: a synthetic coordinate based system for recommendations. Expert Syst Appl 79:8–19 Papadakis H, Panagiotakis C, Fragopoulou P (2017) SCoR: a synthetic coordinate based system for recommendations. Expert Syst Appl 79:8–19
31.
Zurück zum Zitat Park DH, Kim HK, Choi IY, Kim JK (2012) A literature review and classification of recommender systems research. Expert Syst Appl 39(11):10059–10072 Park DH, Kim HK, Choi IY, Kim JK (2012) A literature review and classification of recommender systems research. Expert Syst Appl 39(11):10059–10072
32.
Zurück zum Zitat Pitsilis GK, Ramampiaro H, Langseth H (2019) Securing tag-based recommender systems against profile injection attacks: a comparative study. arXiv:1901.08422 Pitsilis GK, Ramampiaro H, Langseth H (2019) Securing tag-based recommender systems against profile injection attacks: a comparative study. arXiv:​1901.​08422
33.
Zurück zum Zitat Ricci F, Rokach L, Shapira B (2015) Recommender systems: introduction and challenges. In: Recommender systems handbook, Springer, pp 1–34 Ricci F, Rokach L, Shapira B (2015) Recommender systems: introduction and challenges. In: Recommender systems handbook, Springer, pp 1–34
34.
Zurück zum Zitat Salakhutdinov R, Mnih A, Hinton G (2007) Restricted boltzmann machines for collaborative filtering. In: Proceedings of the 24th international conference on Machine learning, ACM, pp 791–798 Salakhutdinov R, Mnih A, Hinton G (2007) Restricted boltzmann machines for collaborative filtering. In: Proceedings of the 24th international conference on Machine learning, ACM, pp 791–798
35.
Zurück zum Zitat Si M, Li Q (2018) Shilling attacks against collaborative recommender systems: a review. Artif Intell Rev 53:1–29 Si M, Li Q (2018) Shilling attacks against collaborative recommender systems: a review. Artif Intell Rev 53:1–29
36.
Zurück zum Zitat Turk AM, Bilge A (2019) Robustness analysis of multi-criteria collaborative filtering algorithms against shilling attacks. Expert Syst Appl 115:386–402 Turk AM, Bilge A (2019) Robustness analysis of multi-criteria collaborative filtering algorithms against shilling attacks. Expert Syst Appl 115:386–402
37.
Zurück zum Zitat Williams CA, Mobasher B, Burke R (2007) Defending recommender systems: detection of profile injection attacks. Serv Oriented Comput Appl 1(3):157–170 Williams CA, Mobasher B, Burke R (2007) Defending recommender systems: detection of profile injection attacks. Serv Oriented Comput Appl 1(3):157–170
38.
Zurück zum Zitat Yang F, Gao M, Yu J, Song Y, Wang X (2018) Detection of shilling attack based on bayesian model and user embedding. In: 2018 IEEE 30th International conference on tools with artificial intelligence (ICTAI), IEEE, pp 639–646 Yang F, Gao M, Yu J, Song Y, Wang X (2018) Detection of shilling attack based on bayesian model and user embedding. In: 2018 IEEE 30th International conference on tools with artificial intelligence (ICTAI), IEEE, pp 639–646
39.
Zurück zum Zitat Yang Z, Cai Z, Guan X (2016) Estimating user behavior toward detecting anomalous ratings in rating systems. Knowl Based Syst 111:144–158 Yang Z, Cai Z, Guan X (2016) Estimating user behavior toward detecting anomalous ratings in rating systems. Knowl Based Syst 111:144–158
41.
Zurück zum Zitat Yang Z, Xu L, Cai Z, Xu Z (2016) Re-scale adaboost for attack detection in collaborative filtering recommender systems. Knowl Based Syst 100:74–88 Yang Z, Xu L, Cai Z, Xu Z (2016) Re-scale adaboost for attack detection in collaborative filtering recommender systems. Knowl Based Syst 100:74–88
42.
Zurück zum Zitat Zhang F, Zhang Z, Zhang P, Wang S (2018) UD-HMM: an unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering. Knowl Based Syst 148:146–166 Zhang F, Zhang Z, Zhang P, Wang S (2018) UD-HMM: an unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering. Knowl Based Syst 148:146–166
43.
Zurück zum Zitat Zhang F, Zhou Q (2014) HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl Based Syst 65:96–105 Zhang F, Zhou Q (2014) HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl Based Syst 65:96–105
44.
Zurück zum Zitat Zhou W, Wen J, Xiong Q, Gao M, Zeng J (2016) SVM-TIA a shilling attack detection method based on svm and target item analysis in recommender systems. Neurocomputing 210:197–205 Zhou W, Wen J, Xiong Q, Gao M, Zeng J (2016) SVM-TIA a shilling attack detection method based on svm and target item analysis in recommender systems. Neurocomputing 210:197–205
Metadaten
Titel
Unsupervised and supervised methods for the detection of hurriedly created profiles in recommender systems
verfasst von
Costas Panagiotakis
Harris Papadakis
Paraskevi Fragopoulou
Publikationsdatum
30.04.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics / Ausgabe 9/2020
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-020-01108-4

Weitere Artikel der Ausgabe 9/2020

International Journal of Machine Learning and Cybernetics 9/2020 Zur Ausgabe

Neuer Inhalt