Detecting shilling attacks in recommender systems based on analysis of user rating behavior

被引:33
作者
Cai, Hongyun [1 ,2 ,3 ,4 ]
Zhang, Fuzhi [1 ,3 ,4 ]
机构
[1] Yanshan Univ, Sch Informat Sci & Engn, Qinhuangdao, Hebei, Peoples R China
[2] Hebei Univ, Sch Cyber Secur & Comp, Baoding, Hebei, Peoples R China
[3] Key Lab Comp Virtual Technol & Syst Integrat Hebe, Qinhuangdao, Hebei, Peoples R China
[4] Key Lab Software Engn Hebei Prov, Qinhuangdao, Hebei, Peoples R China
基金
中国国家自然科学基金;
关键词
Recommender systems; Shilling attacks; Shilling attack detection; Target item identification; User rating behavior analysis;
D O I
10.1016/j.knosys.2019.04.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The existing unsupervised methods for detecting shilling attacks are mostly based on the rating patterns of users, ignoring the rating behavior difference between genuine users and attack users, and these methods suffer from low accuracy in detecting various shilling attacks without a priori knowledge of the attacks. To address these limitations, we propose a novel unsupervised shilling attack detection model based on an analysis of user rating behavior. First, we identify the target item(s) and the corresponding intentions of the attack users by analyzing the deviation of rating tendencies on each item, and based on this analysis, a set of suspicious users is constructed. Second, we analyze the users' rating behaviors from an interest preference and rating preference perspective. In particular, we measure the diversity and memory of users' interest preferences by entropy and block entropy, respectively, and we analyze the memory of user rating preferences by a self-correlation analysis. Finally, we calculate the suspicious degree and spot attack users in the set of suspicious users based on measurements of user rating behavior. Experimental results on the Netflix dataset, the MovieLens 1M dataset and the sampled Amazon review dataset demonstrate the effectiveness of the proposed detection model. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:22 / 43
页数:22
相关论文
共 38 条
[1]   A novel shilling attack detection method [J].
Bilge, Alper ;
Ozdemir, Zeynep ;
Polat, Huseyin .
2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014, 2014, 31 :165-174
[2]   Matrix factorization for recommendation with explicit and implicit feedback [J].
Chen, Shulong ;
Peng, Yuxing .
KNOWLEDGE-BASED SYSTEMS, 2018, 158 :109-117
[3]   Shilling attacks against recommender systems: a comprehensive survey [J].
Gunes, Ihsan ;
Kaleli, Cihan ;
Bilge, Alper ;
Polat, Huseyin .
ARTIFICIAL INTELLIGENCE REVIEW, 2014, 42 (04) :767-799
[4]  
Hurley N., 2009, P 3 ACM C REC SYST, P149
[5]   Algorithm to determine ε-distance parameter in density based clustering [J].
Jahirabadkar, Sunita ;
Kulkarni, Parag .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (06) :2939-2946
[6]  
Lam Shyong K, 2004, WWW, P393, DOI DOI 10.1145/988672.988726
[7]   Shilling Attack Detection-A New Approach for a Trustworthy Recommender System [J].
Lee, Jong-Seok ;
Zhu, Dan .
INFORMS JOURNAL ON COMPUTING, 2012, 24 (01) :117-131
[8]   Distance-based double-quantitative rough fuzzy sets with logic operations [J].
Li, Wentao ;
Pedrycz, Witold ;
Xue, Xiaoping ;
Xu, Weihua ;
Fan, Bingjiao .
INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2018, 101 :206-233
[9]  
[李勇 Li Yong], 2015, [计算机研究与发展, Journal of Computer Research and Development], V52, P779
[10]  
Liang Z., 2014, IEEE INT C INF AUT, P1017