Shilling Attacks Analysis in Collaborative Filtering Based Web Service Recommendation Systems

被引:7
作者
Li, Xiang [1 ,2 ]
Gao, Min [1 ,2 ]
Rong, Wenge [3 ]
Xiong, Qingyu [1 ,2 ]
Wen, Junhao [1 ,2 ]
机构
[1] Chongqing Univ, Key Lab Dependable Serv Comp Cyber Phys Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Sch Software Engn, Chongqing 400044, Peoples R China
[3] Beihang Univ, Sch Comp Sci & Engn, Beijing 100191, Peoples R China
来源
2016 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS) | 2016年
关键词
Collaborative filtering; Shilling attacks; QoS; Web service; Pareto attack models; SELECTION;
D O I
10.1109/ICWS.2016.75
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the development of information technology, more and more web services have emerged, thereby making it difficult for customers to find their favorite services quickly and accurately. To overcome this difficulty, recently the collaborative filtering (CF) technique has been widely employed for personalized service recommendation, meanwhile improving the profits of service providers. Although the CF-based web service recommender systems have shown their potential, they appear to be vulnerable to shilling attack problems. Therefore, in this paper we analyze a general form of web service shilling attacks and four kinds of classical attack models, e.g., average attack, bandwagon attack, random attack, and segment attack are thoroughly investigated. Furthermore, we also study the impact of distributionaware Pareto attack models. To demonstrate how shilling attacks alter the recommendation results, this paper analyzes 1) the variation of Quality-of-Service (QoS) prediction values of target services, 2) the QoS value prediction shifts of services with short response time which are more likely recommended, and 3) the comparison of prediction shift caused by classical attack models and Pareto attack models. The experimental results on WS-DREAM dataset revealed several interesting findings about the predictions of QoS values of target service correlated to different attack models. It is expected that this work can provide some insight for future vulnerability analysis of CF-based web service recommender systems.
引用
收藏
页码:538 / 545
页数:8
相关论文
共 32 条
[31]  
Zheng ZB, 2009, 2009 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, P437, DOI 10.1109/ICWS.2009.30
[32]  
Zibin Zheng, 2010, 2010 IEEE International Conference on Web Services (ICWS), P83, DOI 10.1109/ICWS.2010.10