Fake Co-visitation Injection Attacks to Recommender Systems

被引:78
作者
Yang, Guolei [1 ]
Gong, Neil Zhenqiang [1 ]
Cai, Ying [1 ]
机构
[1] Iowa State Univ, Ames, IA 50011 USA
来源
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) | 2017年
关键词
D O I
10.14722/ndss.2017.23020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recommender systems have become an essential component in a wide range of web services. It is believed that recommender systems recommend a user items (e.g., videos on YouTube, products on Amazon) that match the user's preference. In this work, we propose new attacks to recommender systems. Our attacks exploit fundamental vulnerabilities of recommender systems and can spoof a recommender system to make recommendations as an attacker desires. Our key idea is to inject fake co-visitations to the system. Given a bounded number of fake co-visitations that an attacker can inject, two key challenges are 1) which items the attacker should inject fake co-visitations to, and 2) how many fake co-visitations an attacker should inject to each item. We address these challenges via modelling our attacks as constrained linear optimization problems, by solving which the attacker can perform attacks with maximal threats. We demonstrate the feasibility and effectiveness of our attacks via evaluations on both synthetic data and real-world recommender systems on several popular web services including YouTube, eBay, Amazon, Yelp, and Linkedln. We also discuss strategies to mitigate our attacks.
引用
收藏
页数:15
相关论文
共 33 条
[1]   Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions [J].
Adomavicius, G ;
Tuzhilin, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (06) :734-749
[2]  
[Anonymous], 2010, P 4 ACM C REC SYST, DOI DOI 10.1145/1864708.1864770
[3]  
[Anonymous], 2008, TECHNICAL REPORT
[4]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[5]   Recommender systems survey [J].
Bobadilla, J. ;
Ortega, F. ;
Hernando, A. ;
Gutierrez, A. .
KNOWLEDGE-BASED SYSTEMS, 2013, 46 :109-132
[6]  
Bursztein E, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P125
[7]   The Failure of Noise-Based Non-Continuous Audio Captchas [J].
Bursztein, Elie ;
Beauxis, Romain ;
Paskov, Hristo ;
Perito, Daniele ;
Fabry, Celine ;
Mitchell, John .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :19-31
[8]   "You Might Also Like:" Privacy Risks of Collaborative Filtering [J].
Calandrino, Joseph A. ;
Kilzer, Ann ;
Narayanan, Arvind ;
Felten, Edward W. ;
Shmatikov, Vitaly .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :231-246
[9]  
Cha M, 2007, IMC'07: PROCEEDINGS OF THE 2007 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, P1
[10]  
Chatzopoulou G., 2010, INFOCOM IEEE Conference on Computer Communications Workshops, 2010, P1, DOI [10.1109/INFCOMW.2010.5466701, DOI 10.1109/INFCOMW.2010.5466701, DOI 10.1109/INFC0MW.2010.5466701]