Influence level-based Sybil Attack Resistant Recommender Systems

被引:1
|
作者
Noh, Giseop [1 ]
Oh, Hayoung [2 ]
机构
[1] Seoul Natl Univ, Dept Comp Sci & Engn, Seoul 151744, South Korea
[2] Soongsil Univ, Sch Elect & Engn, Seoul 156743, South Korea
来源
2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD) | 2014年
关键词
robust algorithm; recommender systems; link analysis; Sybil attack;
D O I
10.1109/BDCloud.2014.35
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, electronic commerce and online social networks (OSNs) have experienced fast growth, and as a result, recommendation systems (RSs) have become extremely common. Accuracy and robustness are important performance indexes that characterize customized information or suggestions provided by RSs. However, nefarious users may be present, and they can distort information within the RSs by creating fake identities (Sybils). Although prior research has attempted to mitigate the negative impact of Sybils, the presence of these fake identities remains an unsolved problem. In this paper, we introduce a new weighted link analysis and influence level for RSs resistant to Sybil attacks. Our approach is validated through simulations of a broad range of attacks, and it is found to outperform other state-of-the-art recommendation methods in terms of both accuracy and robustness.
引用
收藏
页码:524 / 531
页数:8
相关论文
共 50 条
  • [21] Location verification based defense against sybil attack in sensor networks
    Mukhopadhyay, Debapriyay
    Saha, Indranil
    DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 : 509 - 521
  • [22] Sybil Attack Detection in Vehicular Network based on Received Signal Strength
    Shrestha, Rakesh
    Djuraev, Sirojiddin
    Nam, Seung Yeob
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 745 - 746
  • [23] A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks
    Lim, Kiho
    Islam, Tariqul
    Kim, Hyunbum
    Joung, Jingon
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [24] Research on sybil attack in defense blockchain based on improved PBFT algorithm
    Lai Y.
    Bo Z.
    Liu J.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (09): : 104 - 117
  • [25] Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network
    Ren Xiu-li
    Yang Wei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4569 - 4572
  • [26] Fuzzy Based Collaborative Verification System for Sybil Attack Detection in MANET
    Rajadurai, Hariharan
    Gandhi, Usha Devi
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (04) : 2179 - 2193
  • [27] Cloud-based Sybil Attack Detection Scheme for Connected Vehicles
    Anwar, Anika
    Halabi, Talal
    Zulkernine, Mohammad
    2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
  • [28] Fuzzy Based Collaborative Verification System for Sybil Attack Detection in MANET
    Hariharan Rajadurai
    Usha Devi Gandhi
    Wireless Personal Communications, 2020, 110 : 2179 - 2193
  • [29] A survey of attack detection approaches in collaborative filtering recommender systems
    Rezaimehr, Fatemeh
    Dadkhah, Chitra
    ARTIFICIAL INTELLIGENCE REVIEW, 2021, 54 (03) : 2011 - 2066
  • [30] A survey of attack detection approaches in collaborative filtering recommender systems
    Fatemeh Rezaimehr
    Chitra Dadkhah
    Artificial Intelligence Review, 2021, 54 : 2011 - 2066