Analysis of Methods, Metrics, and Directions in Shilling Attack Detection using Machine Learning Algorithms

被引:0
作者
Hamidi, H. [1 ]
Khatami, F. [1 ]
机构
[1] KN Toosi Univ Technol, Dept Ind Engn, Informat Technol Grp, Tehran, Iran
来源
INTERNATIONAL JOURNAL OF ENGINEERING | 2025年 / 38卷 / 12期
关键词
Shilling Attack; Machine Learning; Shilling Attack Detection; Recommender Systems; Detection Merics; Shilling Attack Models; PROFILE-INJECTION ATTACKS; RECOMMENDER SYSTEMS; NEURAL-NETWORK;
D O I
10.5829/ije.2025.38.12c.16; 10.5829/ije.2025.38.12c.16
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Shilling attacks undermine the integrity of recommender systems, compromising both user trust and system performance. This paper provides a comprehensive review of shilling attack detection methods, focusing on detection metrics and attack dimensions. We analyze 62 studies published between 2000 and 2024, categorizing them based on detection methodologies, attack models, and the algorithms used. Key contributions of the review include a detailed classification of attack detection metrics into generic, model-specific, intra-profile, and residual-based categories, as well as a synthesis of the most commonly applied detection techniques, including supervised, unsupervised, and hybrid models. Our findings reveal that while supervised learning methods, such as Support Vector Machines (SVM) and k-Nearest Neighbors (KNN), dominate the field, deep learning-based approaches and ensemble methods are gaining traction due to their high accuracy in detecting complex attack patterns. Additionally, we identify gaps in current research, particularly the need for more scalable and adaptable detection mechanisms as recommender systems evolve. The scalability of various shilling attack detection methods has been analyzed, and the correlation between detection metrics, attack models, and algorithms has been investigated. This study provides deeper insights for selecting optimal detection techniques in future research. The paper concludes with future directions for enhancing the effectiveness and robustness of shilling attack detection.
引用
收藏
页码:3009 / 3030
页数:22
相关论文
共 96 条
[1]  
Aggarwal C.C., 2016, RECOMMENDER SYSTEMS, P1, DOI DOI 10.1007/978-3-319-29659-3_L
[2]  
Aghili G, 2011, 2011 10 INT C MACH L
[3]   Improving the Shilling Attack Detection in Recommender Systems Using an SVM Gaussian Mixture Model [J].
Alostad, Jasem M. .
JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2019, 18 (01)
[4]  
[Anonymous], 2009, P 3 ACM C REC SYST
[5]   ShillDetector: a binary grey wolf optimization technique for detection of shilling profiles [J].
Bansal, Saumya ;
Baliyan, Niyati .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (2) :697-710
[6]   Shilling attack detection in binary data: a classification approach [J].
Batmaz, Zeynep ;
Yilmazel, Burcu ;
Kaleli, Cihan .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (06) :2601-2611
[7]  
Bhaumik Runa, 2011, Proceedings of the 2011 International Conference on Data Mining (DMIN 2011), P181
[8]  
Bhaumik R., 2006, P 4 WORKSH INT TECHN
[9]   A novel shilling attack detection method [J].
Bilge, Alper ;
Ozdemir, Zeynep ;
Polat, Huseyin .
2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014, 2014, 31 :165-174
[10]  
Bryan K, 2008, P 2008 ACM C REC SYS