A security detection approach based on autonomy-oriented user sensor in social recommendation network

被引:2
|
作者
Wan, Shanshan [1 ]
Liu, Ying [1 ]
机构
[1] Beijing Univ Civil Engn & Architecture, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Autonomous sensor; social recommendation network; dynamic knowledge graph; shilling attack; graph community detection; MODEL; ATTACKS;
D O I
10.1177/15501329221082415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User social network-based recommender system has achieved significant performance in current recommendation fields. However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. Most shilling attack detection approaches depend on the explicit user historical data to locate shilling attackers. Some important features such as information propagation and social feedback of users in social networks have not been noticed. We propose a security detection method based on autonomy-oriented user sensor (AOUSD) to identify shilling attackers. Specifically, (1) the user is simulated as a social sensor with autonomous capabilities, (2) the user interaction model is built based on information propagation, information feedback and information disappearance mechanisms of social sensors, and a user dynamic knowledge graph is formed by considering the variable time function, (3) hierarchical clustering method is used to generate preliminary suspicious candidate groups and graph community detection clustering method is applied on the dynamic knowledge graph to detect the attackers. Then, AOUSD is first simulated on NetLogo and it is compared with other algorithms based on the Amazon data. The results prove the advantages of AOUSD in the efficiency and accuracy on shilling attack detection.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] Minimizing spread of misinformation in social networks: a network topology based approach
    Ghoshal, Arnab Kumar
    Das, Nabanita
    Das, Soham
    Dhar, Subhankar
    SOCIAL NETWORK ANALYSIS AND MINING, 2025, 15 (01)
  • [42] A social network based approach for consensus achievement in multiperson decision making
    Urena, Raquel
    Chiclana, Francisco
    Melancon, Guy
    Herrera-Viedma, Enrique
    INFORMATION FUSION, 2019, 47 : 72 - 87
  • [43] Security and privacy concerns in social networks mathematically modified metaheuristic-based approach
    Krishna, Raguru Jaya
    Gopalakrishnan, T.
    Divyapushpalakshmi, M.
    Amarendra, K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 371 - 382
  • [44] Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic
    Almomani, Ammar
    Akour, Iman
    Manasrah, Ahmed M.
    Almomani, Omar
    Alauthman, Mohammad
    Abdullah, Esra'a
    Al Shwait, Amaal
    Al Sharaa, Razan
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 37 (02): : 2499 - 2517
  • [45] A distributed approach to network anomaly detection based on independent component analysis
    Palmieri, Francesco
    Fiore, Ugo
    Castiglione, Aniello
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1113 - 1129
  • [46] A Step-Based Deep Learning Approach for Network Intrusion Detection
    Zhang, Yanyan
    Ran, Xiangjin
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2021, 128 (03): : 1231 - 1245
  • [47] A Fuzzy Linguistic Approach-Based Non-malicious Noise Detection Algorithm for Recommendation System
    Moses, J. Sharon
    Babu, L. D. Dhinesh
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2018, 20 (08) : 2368 - 2382
  • [48] A novel recommendation-based framework for reconnecting and selecting the efficient friendship path in the heterogeneous social IoT network
    Farhadi, Babak
    Asghari, Parvaneh
    Mahdipour, Ebrahim
    Javadi, Hamid Haj Seyyed
    COMPUTER NETWORKS, 2025, 258
  • [49] An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset
    Rao, Yamarthi Narasimha
    Babu, Kunda Suresh
    SENSORS, 2023, 23 (01)
  • [50] A survey of data mining and social network analysis based anomaly detection techniques
    Kaur, Ravneet
    Singh, Sarbjeet
    EGYPTIAN INFORMATICS JOURNAL, 2016, 17 (02) : 199 - 216