Robust Recommendation Method Based on Shilling Attack Detection and Matrix Factorization Model

被引:0
作者
Hu, Yu-qi
Liu, Kai
Zhang, Fu-zhi [1 ]
机构
[1] Yanshan Univ, Sch Informat Sci & Engn, Qinhuangdao 066004, Peoples R China
来源
2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017) | 2017年
基金
中国国家自然科学基金;
关键词
Collaborative recommendation; Shilling attack; Attack type identification; Attack detection; Matrix factorization model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing robust collaborative recommendation algorithms have low robustness against PIA and AoP attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and matrix factorization model. Firstly, the type of shilling attack is identified based on statistical characteristics of attack profiles. Secondly, we devise corresponding unsupervised detection algorithms for standard attack, AoP and PIA, and the suspicious users and items are flagged. Finally, we devise a robust recommendation algorithm by combining the proposed shilling attack detection algorithm with matrix factorization model, and conduct experiments on the MovieLens dataset to demonstrate its effectiveness. Experimental results show that the proposed method exhibits good recommendation precision and excellent robustness for shilling attacks of multiple types.
引用
收藏
页码:300 / 307
页数:8
相关论文
共 50 条
  • [31] Research on load frequency control system attack detection method based on multi-model fusion
    Feng Zheng
    Weixun Li
    Huifeng Li
    Libo Yang
    Zengjie Sun
    [J]. Energy Informatics, 8 (1)
  • [32] Hybrid gated recurrent unit and convolutional neural network-based deep learning mechanism for efficient shilling attack detection in social networks
    Praveena, N.
    Juneja, Kapil
    Rashid, Mamoon
    Almagrabi, Alaa Omran
    Sekaran, Kaushik
    Ramalingam, Rajakumar
    Usman, Muhammad
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [33] Detection Method of DC Microgrid Network Attack Based on Two-level and Multi-segment Model
    Zou, Liren
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (02) : 1665 - 1681
  • [34] A BiLSTM-Based DDoS Attack Detection Method for Edge Computing
    Zhang, Yiying
    Liu, Yiyang
    Guo, Xiaoyan
    Liu, Zhu
    Zhang, Xiankun
    Liang, Kun
    [J]. ENERGIES, 2022, 15 (21)
  • [35] Detection Method of DC Microgrid Network Attack Based on Two-level and Multi-segment Model
    Liren Zou
    [J]. Wireless Personal Communications, 2022, 127 : 1665 - 1681
  • [36] ADS-B spoofing attack detection method based on LSTM
    Wang, Jing
    Zou, Yunkai
    Ding, Jianli
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [37] Attack Detection Method based on Bayesian Hypothesis Testing Principle in CPS
    Han, Ke
    Duan, Youyan
    Jin, Rui
    Ma, Zhicheng
    Wang, Huihui
    Wu, Wendou
    Wang, Baijuan
    Cai, Xiaobo
    [J]. 2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 474 - 480
  • [38] ADS-B spoofing attack detection method based on LSTM
    Jing Wang
    Yunkai Zou
    Jianli Ding
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [39] APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning
    Li, Jiacheng
    Li, Tong
    Zhang, Runzi
    Wu, Di
    Yue, Hao
    Yang, Zhen
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 10 - 19
  • [40] The Hybrid Similar Neighborhood Robust Factorization Machine Model for Can Bus Intrusion Detection in the In-Vehicle Network
    He, Yuchu
    Jia, Zhijuan
    Hu, Mingsheng
    Cui, Chi
    Cheng, Yage
    Yang, Yanyan
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) : 16833 - 16841