Fake Co-visitation Injection Attacks to Recommender Systems

被引:78
作者
Yang, Guolei [1 ]
Gong, Neil Zhenqiang [1 ]
Cai, Ying [1 ]
机构
[1] Iowa State Univ, Ames, IA 50011 USA
来源
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) | 2017年
关键词
D O I
10.14722/ndss.2017.23020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recommender systems have become an essential component in a wide range of web services. It is believed that recommender systems recommend a user items (e.g., videos on YouTube, products on Amazon) that match the user's preference. In this work, we propose new attacks to recommender systems. Our attacks exploit fundamental vulnerabilities of recommender systems and can spoof a recommender system to make recommendations as an attacker desires. Our key idea is to inject fake co-visitations to the system. Given a bounded number of fake co-visitations that an attacker can inject, two key challenges are 1) which items the attacker should inject fake co-visitations to, and 2) how many fake co-visitations an attacker should inject to each item. We address these challenges via modelling our attacks as constrained linear optimization problems, by solving which the attacker can perform attacks with maximal threats. We demonstrate the feasibility and effectiveness of our attacks via evaluations on both synthetic data and real-world recommender systems on several popular web services including YouTube, eBay, Amazon, Yelp, and Linkedln. We also discuss strategies to mitigate our attacks.
引用
收藏
页数:15
相关论文
共 33 条
[21]  
Lang K., 1995, Machine Learning. Proceedings of the Twelfth International Conference on Machine Learning, P331
[22]  
Lecuyer Mathias, 2014, 23 USENIX SEC S USEN 23 USENIX SEC S USEN
[23]   Amazon.com recommendation - Item-to-item collaborative filtering [J].
Linden, G ;
Smith, B ;
York, J .
IEEE INTERNET COMPUTING, 2003, 7 (01) :76-80
[24]   Structural Analysis of User Choices for Mobile App Recommendation [J].
Liu, Bin ;
Wu, Yao ;
Gong, Neil Zhenqiang ;
Wu, Junjie ;
Xiong, Hui ;
Ester, Martin .
ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2016, 11 (02)
[25]   Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference [J].
Liu, Bin ;
Kong, Deguang ;
Cen, Lei ;
Gong, Neil Zhenqiang ;
Jin, Hongxia ;
Xiong, Hui .
WSDM'15: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2015, :315-324
[26]   Understanding the Detection of View Fraud in Video Content Portals [J].
Marciel, Miriam ;
Cuevas, Ruben ;
Banchs, Albert ;
Gonzalez, Roberto ;
Traverso, Stefano ;
Ahmed, Mohamed ;
Azcorra, Arturo .
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16), 2016, :357-368
[27]   Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness [J].
Mobasher, Bamshad ;
Burke, Robin ;
Bhaumik, Runa ;
Williams, Chad .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2007, 7 (04)
[28]  
O'Mahony M., 2004, ACM Trans. Internet Technol, V4, DOI DOI 10.1145/1031114.1031116
[29]   Learning and revising user profiles: The identification of interesting Web sites [J].
Pazzani, M ;
Billsus, D .
MACHINE LEARNING, 1997, 27 (03) :313-331
[30]  
Resnick P., 1994, Transcending Boundaries, CSCW '94. Proceedings of the Conference on Computer Supported Cooperative Work, P175, DOI 10.1145/192844.192905