Shilling attacks against collaborative recommender systems: a review

被引:75
作者
Si, Mingdan [1 ]
Li, Qingshan [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710000, Peoples R China
基金
中国国家自然科学基金;
关键词
Profile injection attack; Shilling attack; Collaborative filtering; Robustness; Attack detection; PROFILE-INJECTION ATTACKS; TRUST; INFORMATION; FRAMEWORK; TAXONOMY;
D O I
10.1007/s10462-018-9655-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Collaborative filtering recommender systems (CFRSs) have already been proved effective to cope with the information overload problem since they merged in the past two decades. However, CFRSs are highly vulnerable to shilling or profile injection attacks since their openness. Ratings injected by malicious users seriously affect the authenticity of the recommendations as well as users' trustiness in the recommendation systems. In the past two decades, various studies have been conducted to scrutinize different profile injection attack strategies, shilling attack detection schemes, robust recommendation algorithms, and to evaluate them with respect to accuracy and robustness. Due to their popularity and importance, we survey about shilling attacks in CFRSs. We first briefly discuss the related survey papers about shilling attacks and analyze their deficiencies to illustrate the necessity of this paper. Next we give an overall picture about various shilling attack types and their deployment modes. Then we explain profile injection attack strategies, shilling attack detection schemes and robust recommendation algorithms proposed so far in detail. Moreover, we briefly explain evaluation metrics of the proposed schemes. Last, we discuss some research directions to improve shilling attack detection rates robustness of collaborative recommendation, and conclude this paper.
引用
收藏
页码:291 / 319
页数:29
相关论文
共 156 条
  • [41] Cheng Zunping, 2009, Proceedings of the third ACM conference on Recommender systems, P141
  • [42] Application of Web usage mining and product taxonomy to collaborative recommendations in e-commerce
    Cho, YH
    Kim, JK
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2004, 26 (02) : 233 - 246
  • [43] βP: A novel approach to filter out malicious rating profiles from recommender systems
    Chung, Chen-Yao
    Hsu, Ping-Yu
    Huang, Shih-Hsiang
    [J]. DECISION SUPPORT SYSTEMS, 2013, 55 (01) : 314 - 325
  • [44] A hybrid system of pedagogical pattern recommendations based on singular value decomposition and variable data attributes
    Cobos, Carlos
    Rodriguez, Orlando
    Rivera, Jarvein
    Betancourt, John
    Mendoza, Martha
    Leon, Elizabeth
    Herrera-Viedma, Enrique
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2013, 49 (03) : 607 - 625
  • [45] Cong Li, 2011, 2011 International Conference of Soft Computing and Pattern Recognition, P190, DOI 10.1109/SoCPaR.2011.6089138
  • [46] Dellarocas C., 2000, EC'00. Proceedings of the 2nd ACM Conference on Electronic Commerce, P150, DOI 10.1145/352871.352889
  • [47] Dongyan Jia, 2013, Journal of Software, V8, P11, DOI 10.4304/jsw.8.1.11-18
  • [48] Domain-Aware Grade Prediction and Top-n Course Recommendation
    Elbadrawy, Asmaa
    Karypis, George
    [J]. PROCEEDINGS OF THE 10TH ACM CONFERENCE ON RECOMMENDER SYSTEMS (RECSYS'16), 2016, : 183 - 190
  • [49] Famei He, 2010, Proceedings of the 2010 IEEE International Conference on Granular Computing (GrC-2010), P692, DOI 10.1109/GrC.2010.130
  • [50] Fuguo Zhang, 2011, 2011 Fifth International Conference on Management of E-Commerce and E-Government, P269, DOI 10.1109/ICMeCG.2011.10