Robust Recommendation Method Based on Shilling Attack Detection and Matrix Factorization Model

被引:0
作者
Hu, Yu-qi
Liu, Kai
Zhang, Fu-zhi [1 ]
机构
[1] Yanshan Univ, Sch Informat Sci & Engn, Qinhuangdao 066004, Peoples R China
来源
2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017) | 2017年
基金
中国国家自然科学基金;
关键词
Collaborative recommendation; Shilling attack; Attack type identification; Attack detection; Matrix factorization model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The existing robust collaborative recommendation algorithms have low robustness against PIA and AoP attacks. Aiming at the problem, we propose a robust recommendation method based on shilling attack detection and matrix factorization model. Firstly, the type of shilling attack is identified based on statistical characteristics of attack profiles. Secondly, we devise corresponding unsupervised detection algorithms for standard attack, AoP and PIA, and the suspicious users and items are flagged. Finally, we devise a robust recommendation algorithm by combining the proposed shilling attack detection algorithm with matrix factorization model, and conduct experiments on the MovieLens dataset to demonstrate its effectiveness. Experimental results show that the proposed method exhibits good recommendation precision and excellent robustness for shilling attacks of multiple types.
引用
收藏
页码:300 / 307
页数:8
相关论文
共 50 条
[41]   Interpretable deep learning method for attack detection based on spatial domain attention [J].
Liu, Hongyu ;
Lang, Bo ;
Chen, Shaojie ;
Yuan, Mengyang .
26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
[42]   RSS based multistage statistical method for attack detection and localization in IoT networks [J].
Saxena, Shubham ;
Pandey, Ankur ;
Kumar, Sudhir .
PERVASIVE AND MOBILE COMPUTING, 2022, 85
[43]   A DDoS Attack Detection Method Using Conditional Entropy Based on SDN Traffic [J].
Tian, Qiwen ;
Miyata, Sumiko .
IOT, 2023, 4 (02) :95-111
[44]   Replay attack detection method based on pseudo periodic control signal coding [J].
Zhang Z.-D. ;
Wang Y.-Y. ;
Xie L.-B. .
Kongzhi yu Juece/Control and Decision, 2023, 38 (10) :2962-2968
[45]   Intelligent collaborative recommendation method based on spectral clustering and latent factor model [J].
Gao Z. ;
Zhang H. ;
Dou W. ;
Xu J. ;
Meng S. .
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2021, 27 (09) :2517-2524
[46]   EXCLF: A LDoS attack detection & mitigation model based on programmable data plane☆ ☆ [J].
Tang, Dan ;
Cao, Hongbo ;
Zhang, Jiliang ;
Qin, Zheng ;
Liang, Wei ;
Ma, Xiaopu .
COMPUTER NETWORKS, 2024, 252
[47]   Optimal DBN-based distributed attack detection model for Internet of Things [J].
Ramesh Babu, Meenigi ;
Veena, Kalludi Narasimhaiah .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (17)
[48]   Attack detection model for BCoT based on contrastive variational autoencoder and metric learning [J].
Wu, Chunwang ;
Liu, Xiaolei ;
Ding, Kangyi ;
Xin, Bangzhou ;
Lu, Jiazhong ;
Liu, Jiayong ;
Huang, Cheng .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01)
[49]   DDoS attack detection and defense based on hybrid deep learning model in SDN [J].
Li C. ;
Wu Y. ;
Qian Z. ;
Sun Z. ;
Wang W. .
2018, Editorial Board of Journal on Communications (39) :176-187
[50]   Multivariate Spectral Analysis and Hypothesis Testing-Based Robust Attack Detection for Multiarea Frequency Control [J].
Amulya, Amulya ;
Swarup, K. Shanti ;
Ramanathan, Ramu .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (08) :4636-4648