Detection of Abnormal Item Based on Time Intervals for Recommender Systems

被引:8
作者
Gao, Min [1 ,2 ]
Yuan, Quan [1 ]
Ling, Bin [3 ]
Xiong, Qingyu [1 ,2 ]
机构
[1] Chongqing Univ, Sch Software Engn, Chongqing 400044, Peoples R China
[2] Minist Educ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing 400044, Peoples R China
[3] Univ Portsmouth, Sch Engn, Portsmouth PO1 3AH, Hants, England
来源
SCIENTIFIC WORLD JOURNAL | 2014年
基金
中国国家自然科学基金;
关键词
ATTACKS;
D O I
10.1155/2014/845897
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of e-business, personalized recommendation has become core competence for enterprises to gain profits and improve customer satisfaction. Although collaborative filtering is the most successful approach for building a recommender system, it suffers from "shilling" attacks. In recent years, the research on shilling attacks has been greatly improved. However, the approaches suffer from serious problem in attack model dependency and high computational cost. To solve the problem, an approach for the detection of abnormal item is proposed in this paper. In the paper, two common features of all attack models are analyzed at first. A revised bottom-up discretized approach is then proposed based on time intervals and the features for the detection. The distributions of ratings in different time intervals are compared to detect anomaly based on the calculation of chi square distribution (chi(2)). We evaluated our approach on four types of items which are defined according to the life cycles of these items. The experimental results show that the proposed approach achieves a high detection rate with low computational cost when the number of attack profiles is more than 15. It improves the efficiency in shilling attacks detection by narrowing down the suspicious users.
引用
收藏
页数:8
相关论文
共 12 条
  • [1] Burke R, 2011, RECOMMENDER SYSTEMS HANDBOOK, P805, DOI 10.1007/978-0-387-85820-3_25
  • [2] Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system
    Cao, Jie
    Wu, Zhiang
    Mao, Bo
    Zhang, Yanchun
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2013, 16 (5-6): : 729 - 748
  • [3] Chirita Paul-Alexandru, 2005, P 7 ANN ACM INT WORK, P67
  • [4] KERBER R, 1992, AAAI-92 PROCEEDINGS : TENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, P123
  • [5] Enhancing Collaborative Filtering by User Interest Expansion via Personalized Ranking
    Liu, Qi
    Chen, Enhong
    Xiong, Hui
    Ding, Chris H. Q.
    Chen, Jian
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2012, 42 (01): : 218 - 233
  • [6] Mehta B, 2007, 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT USER INTERFACES, P14
  • [7] Unsupervised strategies for shilling detection and robust collaborative filtering
    Mehta, Bhaskar
    Nejdl, Wolfgang
    [J]. USER MODELING AND USER-ADAPTED INTERACTION, 2009, 19 (1-2) : 65 - 97
  • [8] Mobasher B, 2006, LECT NOTES ARTIF INT, V4198, P96
  • [9] Wenge Rong, 2013, 2013 IEEE 20th International Conference on Web Services (ICWS), P356, DOI 10.1109/ICWS.2013.55
  • [10] Williams CK, 2006, POETRY REV, V96, P19