KC-GCN: A Semi-Supervised Detection Model against Various Group Shilling Attacks in Recommender Systems

被引:2
作者
Cai H. [1 ,2 ]
Ren J. [1 ,2 ]
Zhao J. [3 ]
Yuan S. [1 ,2 ]
Meng J. [1 ,2 ]
机构
[1] School of Cyber Security and Computer Hebei University, Baoding
[2] Key Laboratory on High Trusted Information System in Hebei Province Hebei University, Baoding
[3] Security Department Hebei University, Baoding
关键词
Convolutional networks - Detection methods - Detection models - Influential users - K-clique - Nearest-neighbour - Relationship graphs - Semi-supervised - Two-stage methods - Users' relationships;
D O I
10.1155/2023/2854874
中图分类号
学科分类号
摘要
Various detection methods have been proposed for defense against group shilling attacks in recommender systems; however, these methods cannot effectively detect attack groups generated based on adversarial attacks (e.g., GOAT) or mixed attack groups. In this study, we propose a two-stage method, called KC-GCN, which is based on k -cliques and graph convolutional networks. First, we construct a user relationship graph, generate suspicious candidate groups, and extract influential users by calculating the user nearest-neighbor similarity. We construct the user relationship graph by calculating the edge weight between any two users through analyzing their similarity over suspicious time intervals on each item. Second, we combine the extracted user initial embeddings and the structural features hidden in the user relationship graph to detect attackers. On the Netflix and sampled Amazon datasets, the detection results of KC-GCN surpass those of the state-of-the-art methods under different types of group shilling attacks. The F1-measure of KC-GCN can reach above 93% and 87% on these two datasets, respectively. Copyright © 2023 Hongyun Cai et al.
引用
收藏
相关论文
共 37 条
  • [31] Ebrahimian M., Kashef R., Detecting shilling attacks using hybrid deep learning models, Symmetry, 12, 11, pp. 1805-1821, (2020)
  • [32] Zhou Q., Duan L., Semi-supervised recommendation attack detection based on co-forest, Computers & Security, 109, (2021)
  • [33] Zhang S., Yin H., Chen T., GCN-based user representation learning for unifying robust recommendation and fraudster detection, pp. 689-698
  • [34] Li Y., Fan J., Wang Y., Tan K.L., Influence maximization on social graphs: a survey, IEEE Transactions on Knowledge & Data Engineering, 30, 10, pp. 1852-1872, (2018)
  • [35] Liu X., Wu S., Liu C., Zhang Y., Social network node influence maximization method combined with degree discount and local node optimization, Social Network Analysis and Mining, 11, 1, (2021)
  • [36] Xu C., Zhang J., Long C., Uncovering collusive spammers in Chinese review websites, pp. 979-988
  • [37] Qi L., Yang Y., Zhou X., Rafique W., Ma J., Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0, IEEE Transactions on Industrial Informatics, 18, 9, pp. 6503-6511, (2022)