Shilling attack detection in binary data: a classification approach

被引:21
作者
Batmaz, Zeynep [1 ]
Yilmazel, Burcu [1 ]
Kaleli, Cihan [1 ]
机构
[1] Eskisehir Tech Univ, Dept Comp Engn, Eskisehir, Turkey
关键词
Shilling attack; Detection; Collaborative filtering; Classification; Binary ratings; DEFENDING RECOMMENDER SYSTEMS; PROFILE INJECTION ATTACKS; UNSUPERVISED METHOD; MODEL;
D O I
10.1007/s12652-019-01321-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Reliability of a recommender system is extremely substantial for the continuity of the system. Malicious users may harm the reliability of predictions by injecting fake profiles called shilling attacks into the system. Therefore, the detection of such attacks is vital for a recommender system. Thus, many shilling attack detection methods have been studied. However, the proposed solutions work only on numerical rating based recommender systems. On the other hand, it has been shown that collaborative filtering systems utilizing binary ratings are also vulnerable to shilling attacks. In this work, we propose a detection method, which finds out six well-known shilling attack models against binary ratings-based collaborative filtering systems. Besides deriving generic attributes from user profiles, we generate additional model-specific attributes in order to deal with fake profiles. Our empirical results show that the proposed method successfully detects attack profiles even with low attack size and filler size values.
引用
收藏
页码:2601 / 2611
页数:11
相关论文
共 40 条
[1]  
[Anonymous], 2005, 7 ACM INT WORKSHOP W
[2]  
Batmaz Z, 2015, THESIS
[3]  
Bhaumik R., 2006, P 4 WORKSH INT TECHN
[4]   A novel shilling attack detection method [J].
Bilge, Alper ;
Ozdemir, Zeynep ;
Polat, Huseyin .
2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014, 2014, 31 :165-174
[5]  
Burke R., 2006, KDD, P542
[6]  
Burke RJ, 2006, NEW HORIZ MANAG, P3
[7]   An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items [J].
Cai, Hongyun ;
Zhang, Fuzhi .
COMPUTER JOURNAL, 2019, 62 (04) :579-597
[8]   Shilling attack based on item popularity and rated item correlation against collaborative filtering [J].
Chen, Keke ;
Chan, Patrick P. K. ;
Zhang, Fei ;
Li, Qiaoqiao .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2019, 10 (07) :1833-1845
[9]   Shilling Attack Detection using Rated Item Correlation for Collaborative Filtering [J].
Chen, Keke ;
Chan, Patrick P. K. ;
Yeung, Daniel S. .
2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, :3553-3558
[10]  
Chen KK, 2018, INT CONF MACH LEARN, P667, DOI 10.1109/ICMLC.2018.8526971