A Method of Detecting Bot Networks Based on Graph Clustering in the Recommendation System of Social Network

被引:0
作者
Meleshko, Yelyzaveta [1 ,2 ]
Yakymenko, Mykola [1 ]
Semenov, Serhii [2 ]
机构
[1] Cent Ukrainian Natl Tech Univ, 8 Univ Sky Prosp, UA-25006 Kropyvnytskyi, Ukraine
[2] Natl Tech Univ, Kharkiv Polytech Inst, 2 Kyrpychova Str, UA-61002 Kharkiv, Ukraine
来源
COLINS 2021: COMPUTATIONAL LINGUISTICS AND INTELLIGENT SYSTEMS, VOL I | 2021年 / 2870卷
关键词
recommendation systems; data analysis; clustering; information attacks; bot networks; graphs; algorithms; computer simulation; social networks; websites;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a method for detecting a network of bots in the recommendation system based on graph clustering and analysis of user actions. This method is proposed to be used if there are signs of an attack on the recommendation system and a set of probable targets of the attack is revealed. A series of experiments was carried out to test the effectiveness of the proposed method. The input data for the experiments were generated in the developed software simulation model of users and items of the recommendation system that made it possible to simulate the influence of external destabilizing factors on the system such as information attacks. A subsystem of information security of the recommendation system has been developed. Such subsystem consists of a method of detecting an information attack on the recommendation system based on trend analysis in item ratings and a method of detecting bot networks in the recommendation system based on graph clustering and user action analysis. Also, appropriate algorithms have been developed.
引用
收藏
页数:13
相关论文
共 32 条
[1]   Statistical mechanics of complex networks [J].
Albert, R ;
Barabási, AL .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :47-97
[2]  
[Anonymous], 2005, 7 ACM INT WORKSHOP W
[3]  
Barabasi A., 2018, Network Science
[4]  
Bernovskyi M. M., 2012, Proceedings of the Institute for System Programming of RAS, V22, P419, DOI [DOI 10.15514/ISPRAS-2012-22-22, 10.15514/ISPRAS-2012-22-22]
[5]  
Bohush V. M., 2005, INFORM SECURITY STAT
[6]  
Foreman J.W., 2013, Data smart: Using data science to transform information into insight
[7]  
Gubanov D. A., 2010, SOCIAL NETWORKS MODE
[8]   Shilling attacks against recommender systems: a comprehensive survey [J].
Gunes, Ihsan ;
Kaleli, Cihan ;
Bilge, Alper ;
Polat, Huseyin .
ARTIFICIAL INTELLIGENCE REVIEW, 2014, 42 (04) :767-799
[9]  
Gusarova N. F, 2016, ANAL SOCIAL NETWORKS
[10]   The MovieLens Datasets: History and Context [J].
Harper, F. Maxwell ;
Konstan, Joseph A. .
ACM TRANSACTIONS ON INTERACTIVE INTELLIGENT SYSTEMS, 2016, 5 (04)