Preventing Recommendation Attack in Trust-Based Recommender Systems

被引:11
|
作者
Zhang, Fu-Guo [1 ,2 ,3 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat & Technol, Nanchang 330013, Peoples R China
[2] Jiangxi Univ Finance & Econ, Inst Informat Resource Management, Nanchang 330013, Peoples R China
[3] Jiangxi Univ Finance & Econ, Jiangxi Key Lab Data & Knowledge Engn, Nanchang 330013, Peoples R China
关键词
data lineage; victim" node; attack; trust propagation;
D O I
10.1007/s11390-011-0181-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Despite its success, similarity-based collaborative filtering suffers from some limitations, such as scalability, sparsity and recommendation attack. Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations. We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system. To the best of our knowledge, there has not any prior study on recommendation attack in a trust-based recommender system. We analyze the attack problem, and find that "victim" nodes play a significant role in the attack. Furthermore, we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system. Feasibility study of the defend method is done with the dataset crawled from Epinions website.
引用
收藏
页码:823 / 828
页数:6
相关论文
共 50 条
  • [21] A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems
    Zhang, Qiang
    Luo, Yuan
    Weng, Chuliang
    Li, Minglu
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 59 - 64
  • [22] A Trust-based Friend Recommendation Strategy in Microblog
    Cui, Shan
    Liu, Ruifang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 662 - 667
  • [23] Towards an approach of trust-based recommendation system
    Gmach, Imen
    Sidhom, Sahbi
    Melek, Ghenima
    Khrifish, Lofi
    2015 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND ECONOMIC INTELLIGENCE (SIIE), 2015, : 150 - 157
  • [24] Trust-based Recommender System for Fake News Mitigation
    Sallami, Dorsaf
    Ben Salem, Rim
    Aimeur, Esma
    2023 ADJUNCT PROCEEDINGS OF THE 31ST ACM CONFERENCE ON USER MODELING, ADAPTATION AND PERSONALIZATION, UMAP 2023, 2023, : 104 - 109
  • [25] Personalized Recommendation via Trust-Based Diffusion
    Liu, Yuanzhen
    Han, Lixin
    Gou, Zhinan
    Yang, Yi
    IEEE ACCESS, 2019, 7 : 94195 - 94204
  • [26] A Trust-Based Prediction Approach for Recommendation System
    Wang, Peng
    Huang, Haiping
    Zhu, Jie
    Qi, Lingtao
    SERVICES - SERVICES 2018, 2018, 10975 : 157 - 164
  • [27] Analysis of Segment Shilling Attack against Trust based Recommender Systems
    Zhang, Fuguo
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9092 - 9095
  • [28] Dealing with Collusion Attack in a Trust-Based MANET
    Abassi, Ryma
    CYBERNETICS AND SYSTEMS, 2018, 49 (7-8) : 475 - 496
  • [29] Integrating the importance levels of friends into trust-based ant-colony recommender systems
    Tengkiattrakul, Phannakan
    Maneeroj, Saranya
    Takasu, Atsuhiro
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2019, 15 (01) : 28 - 46
  • [30] Trust-Based Social Item Recommendation: A Case Study
    Xing, Xing
    Zhang, Weishi
    Jia, Zhichun
    Zhang, Xiuguo
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1050 - 1053