Influence level-based Sybil Attack Resistant Recommender Systems

被引:1
|
作者
Noh, Giseop [1 ]
Oh, Hayoung [2 ]
机构
[1] Seoul Natl Univ, Dept Comp Sci & Engn, Seoul 151744, South Korea
[2] Soongsil Univ, Sch Elect & Engn, Seoul 156743, South Korea
来源
2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD) | 2014年
关键词
robust algorithm; recommender systems; link analysis; Sybil attack;
D O I
10.1109/BDCloud.2014.35
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, electronic commerce and online social networks (OSNs) have experienced fast growth, and as a result, recommendation systems (RSs) have become extremely common. Accuracy and robustness are important performance indexes that characterize customized information or suggestions provided by RSs. However, nefarious users may be present, and they can distort information within the RSs by creating fake identities (Sybils). Although prior research has attempted to mitigate the negative impact of Sybils, the presence of these fake identities remains an unsolved problem. In this paper, we introduce a new weighted link analysis and influence level for RSs resistant to Sybil attacks. Our approach is validated through simulations of a broad range of attacks, and it is found to outperform other state-of-the-art recommendation methods in terms of both accuracy and robustness.
引用
收藏
页码:524 / 531
页数:8
相关论文
共 50 条
  • [31] TAaMR: Targeted Adversarial Attack against Multimedia Recommender Systems
    Di Noia, Tommaso
    Malitesta, Daniele
    Mena, Felice Antonio
    50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2020), 2020, : 1 - 8
  • [32] Ready for emerging threats to recommender systems? A graph convolution-based generative shilling attack
    Wu, Fan
    Gao, Min
    Yu, Junliang
    Wang, Zongwei
    Liu, Kecheng
    Wang, Xu
    INFORMATION SCIENCES, 2021, 578 : 683 - 701
  • [33] Topic-level trust in recommender systems
    Zhang Fu-guo
    Xu Sheng-hua
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (14TH) VOLS 1-3, 2007, : 156 - 161
  • [34] A Macroscopic Traffic Model-based Approach for Sybil Attack Detection in VANETs
    Ayaida, Marwane
    Messai, Nadhir
    Najeh, Sameh
    Ndjore, Kouame Boris
    AD HOC NETWORKS, 2019, 90
  • [35] A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network
    Jan, Mian Ahmad
    Nanda, Priyadarsi
    He, Xiangjian
    Liu, Ren Ping
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 318 - 325
  • [36] Sybil Attack Detection and Analysis of Energy Consumption in Cluster Based Sensor Networks
    Saxena, Sweety
    Sejwar, Vikas
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (05): : 15 - 30
  • [37] Node ID based detection of Sybil attack in mobile wireless sensor network
    Sharmila, S.
    Umamaheswari, G.
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2013, 100 (10) : 1441 - 1454
  • [38] Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks
    Gu, Pengwenlong
    Khatoun, Rida
    Begriche, Youcef
    Serhrouchni, Ahmed
    2017 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2017,
  • [39] A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things
    Groves, Bryan
    Pu, Cong
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [40] Detecting Sybil Attack based on State Information in Underwater Wireless Sensor Networks
    Li, Xun
    Han, Guangjie
    Qian, Aihua
    Shu, Lei
    Rodrigues, Joel
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 116 - 120