A security detection approach based on autonomy-oriented user sensor in social recommendation network

被引:2
|
作者
Wan, Shanshan [1 ]
Liu, Ying [1 ]
机构
[1] Beijing Univ Civil Engn & Architecture, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Autonomous sensor; social recommendation network; dynamic knowledge graph; shilling attack; graph community detection; MODEL; ATTACKS;
D O I
10.1177/15501329221082415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User social network-based recommender system has achieved significant performance in current recommendation fields. However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. Most shilling attack detection approaches depend on the explicit user historical data to locate shilling attackers. Some important features such as information propagation and social feedback of users in social networks have not been noticed. We propose a security detection method based on autonomy-oriented user sensor (AOUSD) to identify shilling attackers. Specifically, (1) the user is simulated as a social sensor with autonomous capabilities, (2) the user interaction model is built based on information propagation, information feedback and information disappearance mechanisms of social sensors, and a user dynamic knowledge graph is formed by considering the variable time function, (3) hierarchical clustering method is used to generate preliminary suspicious candidate groups and graph community detection clustering method is applied on the dynamic knowledge graph to detect the attackers. Then, AOUSD is first simulated on NetLogo and it is compared with other algorithms based on the Amazon data. The results prove the advantages of AOUSD in the efficiency and accuracy on shilling attack detection.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] An approach to task-oriented knowledge recommendation based on multi-granularity fuzzy linguistic method
    Li, Ming
    Yuan, Mengyue
    Xu, Yingcheng
    KYBERNETES, 2015, 44 (03) : 460 - 474
  • [22] A Sensor Network Approach for Violence Detection in Smart Cities Using Deep Learning
    Baba, Marius
    Gui, Vasile
    Cernazanu, Cosmin
    Pescaru, Dan
    SENSORS, 2019, 19 (07)
  • [23] Network Anomalies Detection Approach Based on Weighted Voting
    Sakulin, Sergey
    Alfimtsev, Alexander
    Kvitchenko, Konstantin
    Dobkacz, Leonid
    Kalgin, Yuri
    Lychkov, Igor
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [24] Design and user behavior analysis of an English learning social platform based on digital entertainment content recommendation algorithm
    Liu, Wenhua
    ENTERTAINMENT COMPUTING, 2024, 51
  • [25] Wireless sensor network security: A recent review based on state-of-the-art works
    Faris, Mohammed
    Mahmud, Mohd Nazri
    Salleh, Mohd Fadzli Mohd
    Alnoor, Alhamzah
    INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2023, 15
  • [26] A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network
    Rehman, Attique Ur
    Mahmood, Muhammad Sajid
    Raza, Muhammad Ahsan
    Qaswar, Fahad
    Aljameel, Sumayh S.
    Khan, Irfan Ullah
    Aslam, Nida
    ELECTRONICS, 2022, 11 (16)
  • [27] Using multi-features to partition users for friends recommendation in location based social network
    Xin Mingjun
    Wu Lijun
    INFORMATION PROCESSING & MANAGEMENT, 2020, 57 (01)
  • [28] Wireless sensor network for AI-based flood disaster detection
    Al Qundus, Jamal
    Dabbour, Kosai
    Gupta, Shivam
    Meissonier, Regis
    Paschke, Adrian
    ANNALS OF OPERATIONS RESEARCH, 2020, 319 (1) : 697 - 719
  • [29] Communities detection in social network based on local edge centrality
    Li, Xuequn
    Zhou, Shuming
    Liu, Jiafei
    Lian, Guanqin
    Chen, Gaolin
    Lin, Chen-Wan
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2019, 531
  • [30] A sensitive object-oriented approach to big surveillance data compression for social security applications in smart cities
    Xiao, Jing
    Wang, Zhongyuan
    Chen, Yu
    Liao, Liang
    Xiao, Jun
    Zhan, Gen
    Hu, Ruimin
    SOFTWARE-PRACTICE & EXPERIENCE, 2017, 47 (08): : 1061 - 1080