Shilling Attacks Analysis in Collaborative Filtering Based Web Service Recommendation Systems

被引:7
作者
Li, Xiang [1 ,2 ]
Gao, Min [1 ,2 ]
Rong, Wenge [3 ]
Xiong, Qingyu [1 ,2 ]
Wen, Junhao [1 ,2 ]
机构
[1] Chongqing Univ, Key Lab Dependable Serv Comp Cyber Phys Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Sch Software Engn, Chongqing 400044, Peoples R China
[3] Beihang Univ, Sch Comp Sci & Engn, Beijing 100191, Peoples R China
来源
2016 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS) | 2016年
关键词
Collaborative filtering; Shilling attacks; QoS; Web service; Pareto attack models; SELECTION;
D O I
10.1109/ICWS.2016.75
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the development of information technology, more and more web services have emerged, thereby making it difficult for customers to find their favorite services quickly and accurately. To overcome this difficulty, recently the collaborative filtering (CF) technique has been widely employed for personalized service recommendation, meanwhile improving the profits of service providers. Although the CF-based web service recommender systems have shown their potential, they appear to be vulnerable to shilling attack problems. Therefore, in this paper we analyze a general form of web service shilling attacks and four kinds of classical attack models, e.g., average attack, bandwagon attack, random attack, and segment attack are thoroughly investigated. Furthermore, we also study the impact of distributionaware Pareto attack models. To demonstrate how shilling attacks alter the recommendation results, this paper analyzes 1) the variation of Quality-of-Service (QoS) prediction values of target services, 2) the QoS value prediction shifts of services with short response time which are more likely recommended, and 3) the comparison of prediction shift caused by classical attack models and Pareto attack models. The experimental results on WS-DREAM dataset revealed several interesting findings about the predictions of QoS values of target service correlated to different attack models. It is expected that this work can provide some insight for future vulnerability analysis of CF-based web service recommender systems.
引用
收藏
页码:538 / 545
页数:8
相关论文
共 32 条
[11]   Amazon.com recommendation - Item-to-item collaborative filtering [J].
Linden, G ;
Smith, B ;
York, J .
IEEE INTERNET COMPUTING, 2003, 7 (01) :76-80
[12]  
Min Gong, 2013, 2013 IEEE 20th International Conference on Web Services (ICWS), P380, DOI 10.1109/ICWS.2013.58
[13]  
Mobasher B., 2005, Advances in Web Mining and Web Usage Analysis. 7th International Workshop on Knowledge Discovery on the Web, WebKDD 2005. Revised Papers (Lecture Notes in Artificial Intelligence Vol. 4198), P96
[14]  
Mobasher B., 2005, P 2005 WORKSH WEB MI
[15]   Attacks and remedies in collaborative recommendation [J].
Mobasher, Bamshad ;
Burke, Robin ;
Bhaumik, Runa ;
Sandvig, J. J. .
IEEE INTELLIGENT SYSTEMS, 2007, 22 (03) :56-63
[16]  
O'Mahony M., 2004, ACM Trans. Internet Technol, V4, DOI DOI 10.1145/1031114.1031116
[17]  
Qiong Zhang, 2011, Proceedings of the 2011 IEEE International Conference on Web Services (ICWS 2011), P195, DOI 10.1109/ICWS.2011.61
[18]   Collaborative personal profiling for web service ranking and recommendation [J].
Rong, Wenge ;
Peng, Baolin ;
Ouyang, Yuanxin ;
Liu, Kecheng ;
Xiong, Zhang .
INFORMATION SYSTEMS FRONTIERS, 2015, 17 (06) :1265-1282
[19]  
Ruisheng Zhang, 2014, 2014 Second International Conference on Advanced Cloud and Big Data (CBD), P301, DOI 10.1109/CBD.2014.47
[20]  
Shao LS, 2007, 2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, P439