Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Detecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features

To defend recommender systems, various methods have been proposed to detect shilling profiles, which can be categorised as user- and item-based detection methods. Most of the user-based methods identify shilling profiles via statistical signatures of rating values and suffer from low precision when detecting different types of attacks. Most of the item-based methods use temporal information to detect the anomaly items, but they assume that the fake ratings were injected in short periods. So they are invalid for the long duration and decentralised injection attacks. To address these limitations, the authors extract the multidimensional profile temporal features and present a shilling detection method. First, from the user profile view, user rating behaviours are characterised by corrected conditional entropy and the dissimilarity with the rest-rating model. Second, from the item profile view, the user features are extracted according to item temporal popularity. Third, the features based on weighted deviation from dynamic mean are extracted according to the fact that the items mean changes with time. Finally, support vector machine is exploited to detect shilling profiles based on the proposed features. Experimental results on the Netflix dataset indicate that the performance of the proposed method is better than that of the benchmark methods.

References

    1. 1)
      • 18. Gunes, I., Kaleli, C., Bilge, A., et al: ‘Shilling attacks against recommender systems: A comprehensive survey’, Artif. Intell. Rev., 2014, 42, (4), pp. 767799.
    2. 2)
      • 35. Sia, K., Cho, J., Cho, H.: ‘Efficient monitoring algorithm for fast news alerts’, IEEE Trans. Knowl. Data Eng., 2007, 19, (7), pp. 950961.
    3. 3)
      • 39. Perolat, J., Couso, I., Loquin, K., et al: ‘Generalizing the Wilcoxon rank-sum test for interval data’, Int. J. Approx. Reason., 2015, 56, (A), pp. 108121.
    4. 4)
      • 28. Ferraz Costa, A., Yamaguchi, Y., Juci Machado Traina, A., et al: ‘RSC: mining and modeling temporal activity in social media’. Proc. of the 21th ACM SIGKDD int. Conf. on knowledge discovery and data mining, Sydney, Australia, August 2015, pp. 269278.
    5. 5)
      • 4. Mobasher, B., Burke, R., Bhaumik, R., et al: ‘Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness’, ACM Trans. Internet Technol., 2007, 7, (4), pp. 138.
    6. 6)
      • 29. Chu, Z., Gianvecchio, S., Wang, H., et al: ‘Who is tweeting on twitter: human, bot, or cyborg?’. Twenty-Sixth Computer Security Applications Conf., ACSAC 2010, Austin, Texas, USA, December 2010, pp. 2130.
    7. 7)
      • 25. Javari, A., Jalili, M.: ‘Accurate and novel recommendations: an algorithm based on popularity forecasting’, ACM Trans. Intell. Syst. Technol., 2014, 5, (4), pp. 11101122.
    8. 8)
      • 36. Malmgren, R., Stouffer, D., Motter, A., et al: ‘A poissonian explanation for heavy tails in e-mail communication’, Proc. Natl. Acad. Sci. USA, 2008, 105, (47), pp. 1815318158.
    9. 9)
      • 23. Lathia, N., Hailes, S.: ‘Temporal defenses for robust recommendations’. Proc. Int. ECML/PKDD workshop, Barcelona, Spain, September 2010, pp. 6477.
    10. 10)
      • 21. Xia, H., Fang, B., Gao, M., et al: ‘A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique’, Inf. Sci., 2015, 306, pp. 150165.
    11. 11)
      • 14. Mehta, B., Nejdl, W.: ‘Attack resistant collaborative filtering’. Proc. of the 31st annual int. ACM SIGIR Conf. on research and development in information retrieval, Singapore, August 2008, pp. 7582.
    12. 12)
      • 2. Williams, C., Mobasher, B., Burke, R., et al: ‘Detection of obfuscated attacks in collaborative recommender systems’. Proc. of the ECAI06 workshop on recommender systems, Riva del Garda, Italy, August 2006, pp. 1923.
    13. 13)
      • 41. Koren, Y., Bell, R., Volinsky, C.: ‘Matrix factorization techniques for recommender systems’, IEEE Comput., 2009, 42, (8), pp. 3037.
    14. 14)
      • 31. Catai, A., Takahashi, A., Perseguini, N., et al: ‘Effect of the postural challenge on the dependence of the cardiovascular control complexity on age’, Entropy, 2014, 16, (12), pp. 66866704.
    15. 15)
      • 8. Li, W., Gao, M., Li, H., et al: ‘A shilling attack detection algorithm based on popularity degree features’, Acta Autom. Sin., 2015, 41, (9), pp. 15631576. (In Chinese).
    16. 16)
      • 34. Archibald, R., Ghosal, D.: ‘A comparative analysis of detection metrics for covert timing channels’, Comput. Secur., 2014, 45, (8), pp. 284292.
    17. 17)
      • 1. Ray, S., Mahanti, A.: ‘Strategies for effective shilling attacks against recommender systems’. Proc. of the second ACM SIGKDD Int. Workshop, PinKDD 2008, Las Vegas, NV, USA, August 2008, pp. 111125.
    18. 18)
      • 40. O'Mahony, M., Hurley, N., Kushmerick, N., et al: ‘Collaborative recommendation: a robustness analysis’, ACM Trans. Internet Technol., 2004, 4, (4), pp. 344377.
    19. 19)
      • 38. Li, C., Luo, Z., Shi, J.: ‘An unsupervised algorithm fordetecting shilling attacks on recommender systems’, Acta Autom. Sin., 2011, 37, (2), pp. 160167(in Chinese).
    20. 20)
      • 22. Zhou, W., Wen, J., Gao, M., et al: ‘Abnormal profiles detection based on time series and target item analysis for recommender systems’, Math. Probl. Eng., 2015, pp. 19.
    21. 21)
      • 9. Zhang, F., Zhou, Q.: ‘HHT-SVM: An online method for detecting profile injection attacks in collaborative recommender systems’, Knowl. Based Syst., 2014, 65, pp. 96105.
    22. 22)
      • 10. Zhang, F., Chen, H.: ‘An ensemble method for detecting shilling attacks based on ordered item sequences’, Security Commun. Netw., 2016, 9, (7), pp. 680696.
    23. 23)
      • 5. Williams, C., Mobasher, B., Burke, R.: ‘Defending recommender systems: detection of profile injection attacks’, Serv. Oriented Comput. Appl., 2007, 1, (3), pp. 157170.
    24. 24)
      • 32. Guzzetti, S., Mezzetti, S., Magetelli, R., et al: ‘Linear and non-linear 24 h heart rate variability in chronic heart failure’, Autonomic Neurosci., 2000, 86, (1–2), pp. 549561.
    25. 25)
      • 19. Tang, T., Tang, Y.: ‘An effective recommender attack detection method based on time SFM factors’. IEEE 3rd Int. Conf. on Communication Software and Networks (ICCSN), Xi'an, China, May 2011, pp. 7881.
    26. 26)
      • 13. Bhaumik, R., Mobasher, B., Burke, R.: ‘A clustering approach to unsupervised attack detection in collaborative recommender systems’. Proc. of the 7th IEEE int. Conf. on data mining, Las Vegas, NV, USA, August 2011, pp. 181187.
    27. 27)
      • 26. Baltrunas, L., Ricci, F.: ‘Experimental evaluation of context-dependent collaborative filtering using item splitting’, User Model. User-Adapt. Interact., 2014, 24, (1–2), pp. 734.
    28. 28)
      • 17. Hurley, N., Cheng, Z.: ‘Statistical attack detection’. Proc. of the third ACM Conf. on Recommender systems, New York, NY, USA, October 2009, pp. 149156.
    29. 29)
      • 16. Cheng, Z., Hurley, N.: ‘Effective diverse and obfuscated attacks on model-based recommender systems’. Proc. of the third ACM Conf. on Recommender systems, New York, NY, USA, October 2009, pp. 141148.
    30. 30)
      • 11. Zhang, F., Zhou, Q.: ‘Ensemble detection model for profile injection attacks in collaborative recommender systems based on BP neural network’, IET Inf. Sec., 2015, 9, (1), pp. 2431.
    31. 31)
      • 37. Melo, P., Faloutsos, C., Assuncao, R., et al: ‘The self-feeding process: a unifying model for communication dynamics in the web’. Proc. of the 22nd Int. Conf. on World Wide Web, Rio de Janeiro, Brazil, May 2013, pp. 13191329.
    32. 32)
      • 27. Koren, Y.: ‘Collaborative filtering with temporal dynamics’, Commun. ACM, 2010, 53, (4), pp. 8997.
    33. 33)
      • 7. Zhou, W., Wen, J., Xiong, Q., et al: ‘SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems’, Neurocomputing, 2016, 210, pp. 197205.
    34. 34)
      • 20. Zhang, S., Chakrabarti, A., Ford, J., et al: ‘Attack detection in time series for recommender systems’. Proc. of the 12th ACM SIGKDD int. Conf. on knowledge discovery and data mining, Philadelphia, PA, USA, August 2006, pp. 809814.
    35. 35)
      • 30. Porta, A., Baseli, G., Liberati, D., et al: ‘Measuring regularity by means of a corrected conditional entropy in sympathetic outflow’, Biol. Cybern., 1998, 78, (1), pp. 7178.
    36. 36)
      • 3. Chirita, P.A., Nejdl, W., Zamfir, C.: ‘Preventing shilling attacks in online recommender systems’. Proc. of the 7th annual ACM int. workshop on web information and data management, Bremen, Germany, November 2005, pp. 6774.
    37. 37)
      • 6. Yang, Z., Xu, L., Cai, Z., et al: ‘Re-scale AdaBoost for attack detection in collaborative filtering recommender systems’, Knowl. Based Syst., 2016, 100, pp. 7488.
    38. 38)
      • 33. Faes, L., Nollo, G., Porta, A.: ‘Information-based detection of nonlinear granger causality in multivariate processes via a nonuniform embedding technique’, Phys. Rev. E, Stat. Nonlinear Soft Matter Phys., 2011, 83, (1), pp. 971983.
    39. 39)
      • 24. Viswanath, B., Bashir, M., Planck, M.: ‘Towards detecting anomalous user behaviour in online social networks’. Proc. of the 23rd USENIX Security Symp., San Diego, CA, August 2014, pp. 223238.
    40. 40)
      • 15. Mehta, B., Nejdl, W.: ‘Unsupervised strategies for shilling detection and robust collaborative filtering’, User Model. User-Adapt. Interact., 2009, 19, (1–2), pp. 6579.
    41. 41)
      • 12. Zhou, Q., Zhang, F.: ‘Detecting unknown recommendation attacks based on bionic pattern recognition’, J. Softw., 2014, 25, (11), pp. 26522665. (In Chinese).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2017.0012
Loading

Related content

content/journals/10.1049/iet-ifs.2017.0012
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address