Influence level-based Sybil Attack Resistant Recommender Systems

被引:1
|
作者
Noh, Giseop [1 ]
Oh, Hayoung [2 ]
机构
[1] Seoul Natl Univ, Dept Comp Sci & Engn, Seoul 151744, South Korea
[2] Soongsil Univ, Sch Elect & Engn, Seoul 156743, South Korea
来源
2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD) | 2014年
关键词
robust algorithm; recommender systems; link analysis; Sybil attack;
D O I
10.1109/BDCloud.2014.35
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, electronic commerce and online social networks (OSNs) have experienced fast growth, and as a result, recommendation systems (RSs) have become extremely common. Accuracy and robustness are important performance indexes that characterize customized information or suggestions provided by RSs. However, nefarious users may be present, and they can distort information within the RSs by creating fake identities (Sybils). Although prior research has attempted to mitigate the negative impact of Sybils, the presence of these fake identities remains an unsolved problem. In this paper, we introduce a new weighted link analysis and influence level for RSs resistant to Sybil attacks. Our approach is validated through simulations of a broad range of attacks, and it is found to outperform other state-of-the-art recommendation methods in terms of both accuracy and robustness.
引用
收藏
页码:524 / 531
页数:8
相关论文
共 50 条
  • [41] Similarity-Based and Sybil Attack Defended Community Detection for Social Networks
    Jiang, Zhongyuan
    Li, Jing
    Ma, Jianfeng
    Yu, Philip S.
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (12) : 3487 - 3491
  • [42] Doppler-Shift-Based Sybil Attack Detection for Mobile IoT Networks
    Dogan-Tusha, Seda
    Althunibat, Saud
    Qaraqe, Marwa
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1136 - 1147
  • [43] Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems
    Aiolli, Fabio
    Conti, Mauro
    Picek, Stjepan
    Polato, Mirko
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 165 - 184
  • [44] Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
    Mobasher, Bamshad
    Burke, Robin
    Bhaumik, Runa
    Williams, Chad
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2007, 7 (04)
  • [45] Shilling Attack Detection in Recommender Systems via Selecting Patterns Analysis
    Li, Wentao
    Gao, Min
    Li, Hua
    Zeng, Jun
    Xiong, Qingyu
    Hirokawa, Sachio
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (10): : 2600 - 2611
  • [46] Two-Step Boosting for OSN Based Sybil-Resistant Trust Value of Non-Sybil Identities
    Kim, Kyungbaek
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (07): : 1918 - 1922
  • [47] MDKE: Multi-level Disentangled Knowledge-Based Embedding for Recommender Systems
    Zhou, Haolin
    Liu, Qingmin
    Gao, Xiaofeng
    Chen, Guihai
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT II, 2022, : 3 - 18
  • [48] Incorporating System-Level Objectives into Recommender Systems
    Abdollahpouri, Himan
    COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2019 ), 2019, : 2 - 6
  • [49] Keep the Fakes Out: Defending Against Sybil Attack in P2P Systems
    Chen, Kan
    Zhu, Peidong
    Xiong, Yueshan
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 183 - 191
  • [50] A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
    Yan, Junwei
    Jiang, Tao
    Lin, Liwei
    Wu, Zhengyu
    Ye, Xiucai
    Tian, Mengke
    Wang, Yong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)