A security detection approach based on autonomy-oriented user sensor in social recommendation network

被引:2
|
作者
Wan, Shanshan [1 ]
Liu, Ying [1 ]
机构
[1] Beijing Univ Civil Engn & Architecture, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Autonomous sensor; social recommendation network; dynamic knowledge graph; shilling attack; graph community detection; MODEL; ATTACKS;
D O I
10.1177/15501329221082415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User social network-based recommender system has achieved significant performance in current recommendation fields. However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. Most shilling attack detection approaches depend on the explicit user historical data to locate shilling attackers. Some important features such as information propagation and social feedback of users in social networks have not been noticed. We propose a security detection method based on autonomy-oriented user sensor (AOUSD) to identify shilling attackers. Specifically, (1) the user is simulated as a social sensor with autonomous capabilities, (2) the user interaction model is built based on information propagation, information feedback and information disappearance mechanisms of social sensors, and a user dynamic knowledge graph is formed by considering the variable time function, (3) hierarchical clustering method is used to generate preliminary suspicious candidate groups and graph community detection clustering method is applied on the dynamic knowledge graph to detect the attackers. Then, AOUSD is first simulated on NetLogo and it is compared with other algorithms based on the Amazon data. The results prove the advantages of AOUSD in the efficiency and accuracy on shilling attack detection.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Joint Social and Content Recommendation for User-Generated Videos in Online Social Network
    Wang, Zhi
    Sun, Lifeng
    Zhu, Wenwu
    Yang, Shiqiang
    Li, Hongzhi
    Wu, Dapeng
    IEEE TRANSACTIONS ON MULTIMEDIA, 2013, 15 (03) : 698 - 709
  • [2] A multi-theoretical kernel-based approach to social network-based recommendation
    Li, Xin
    Wang, Mengyue
    Liang, T. -P.
    DECISION SUPPORT SYSTEMS, 2014, 65 : 95 - 104
  • [3] An unsupervised method for social network spammer detection based on user information interests
    Koggalahewa, Darshika
    Xu, Yue
    Foo, Ernest
    JOURNAL OF BIG DATA, 2022, 9 (01)
  • [4] A recommendation approach based on correlation and co-occurrence within social learning network
    Souabi, Sonia
    Retbi, Asmaa
    Idrissi, Mohammed Khalidi
    Bennani, Samir
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (14):
  • [5] A Neural Network Ensemble-based Approach to Sensor Fault Detection
    Shui, Aishe
    Chen, Weimin
    Liu, Lichuan
    Shui, Yonghong
    MATERIALS, MECHATRONICS AND AUTOMATION, PTS 1-3, 2011, 467-469 : 923 - +
  • [6] Ontology Based Approach for Network Security
    Arunadevi, M.
    Perumal, K. S.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 573 - 578
  • [7] An Image Recommendation Algorithm Based on Target Alternating Attention and User Affiliation Network
    Wan, Shanshan
    Yang, Shuyue
    Liu, Ying
    Ding, Jiaqi
    Qiu, Dongwei
    Wei, Chuyuan
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [8] A POI group recommendation method in location-based social networks based on user influence
    Sojahrood, Zahra Bahari
    Taleai, Mohammad
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 171
  • [9] Determinants of user behaviour and recommendation in social networks An integrative approach from the uses and gratifications perspective
    Curras-Perez, Rafael
    Ruiz-Mafe, Carla
    Sanz-Blas, Silvia
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2014, 114 (09) : 1477 - 1498
  • [10] Dealing with Pure New User Cold-Start Problem in Recommendation System Based on Linked Open Data and Social Network Features
    Yadav, Usha
    Duhan, Neelam
    Bhatia, Komal Kumar
    MOBILE INFORMATION SYSTEMS, 2020, 2020