Shilling attack detection for recommender systems based on credibility of group users and rating time series

被引:30
|
作者
Zhou, Wei [1 ]
Wen, Junhao [2 ]
Qu, Qiang [1 ]
Zeng, Jun [2 ]
Cheng, Tian [2 ]
机构
[1] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen 518055, Peoples R China
[2] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 40044, Peoples R China
来源
PLOS ONE | 2018年 / 13卷 / 05期
关键词
D O I
10.1371/journal.pone.0196533
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as user ratings and reviews, are used by attackers to manipulate recommendation rankings. Shilling attack detection in recommender systems is of great significance to maintain the fairness and sustainability of recommender systems. The current studies have problems in terms of the poor universality of algorithms, difficulty in selection of user profile attributes, and lack of an optimization mechanism. In this paper, a shilling behaviour detection structure based on abnormal group user findings and rating time series analysis is proposed. This paper adds to the current understanding in the field by studying the credibility evaluation model in-depth based on the rating prediction model to derive proximity-based predictions. A method for detecting suspicious ratings based on suspicious time windows and target item analysis is proposed. Suspicious rating time segments are determined by constructing a time series, and data streams of the rating items are examined and suspicious rating segments are checked. To analyse features of shilling attacks by a group user's credibility, an abnormal group user discovery method based on time series and time window is proposed. Standard testing datasets are used to verify the effect of the proposed method.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Entertainment recommender systems for group of users
    Christensen, Ingrid A.
    Schiaffino, Silvia
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (11) : 14127 - 14135
  • [32] Graph embedding-based approach for detecting group shilling attacks in collaborative recommender systems
    Zhang, Fuzhi
    Qu, Yueqi
    Xu, Yishu
    Wang, Shilei
    KNOWLEDGE-BASED SYSTEMS, 2020, 199
  • [33] Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems
    Gao, Min
    Tian, Renli
    Wen, Junhao
    Xiong, Qingyu
    Ling, Bin
    Yang, Linda
    PLOS ONE, 2015, 10 (08):
  • [34] An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features
    Cai, Hongyun
    Zhang, Fuzhi
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [35] Sequential Attack Detection in Recommender Systems
    Aktukmak, Mehmet
    Yilmaz, Yasin
    Uysal, Ismail
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3285 - 3298
  • [36] Abnormal Group User Detection in Recommender Systems Using Multi-dimension Time Series
    Zhou, Wei
    Wen, Junhao
    Xiong, Qingyu
    Zeng, Jun
    Liu, Ling
    Cai, Haini
    Chen, Tian
    COLLABORATE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2016, 2017, 201 : 373 - 383
  • [37] Shilling Attack Detection Algorithm based on Genetic Optimization
    Li, Tao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 273 - 285
  • [38] Attack Detection in Recommender Systems Based on Target Item Analysis
    Zhou, Wei
    Wen, Junhao
    Koh, Yun Sing
    Alam, Shafiq
    Dobbie, Gillian
    PROCEEDINGS OF THE 2014 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2014, : 318 - 325
  • [39] Targeted Shilling Attacks on GNN-based Recommender Systems
    Guo, Sihan
    Bai, Ting
    Deng, Weihong
    PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 649 - 658
  • [40] Shilling attack defense algorithm for recommender system based on spectral co-clustering
    Yang, Li
    Niu, Xin-Xin
    Huang, Wei
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (06): : 81 - 86