Shilling Attack Models in Recommender System

被引:0
作者
Kaur, Parneet [1 ]
Goel, Shivani [1 ]
机构
[1] Thapar Univ, Comp Sci & Engn Dept, Patiala, Punjab, India
来源
2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2 | 2016年
关键词
Shilling attack; collaborative filtering; shilling attack models; recommender system; prediction shift;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Recommender systems which are based on collaborative filtering are vulnerable to "shilling attacks" due to their open nature. Shillers inject a few unscrupulous "shilling profiles" into the database of ratings for altering the system's recommendation, due to which some inappropriate items are recommended by the system. In this paper, we simulated shilling attacks namely random, average, bandwagon and segment on Movie-Lens(1) dataset, which focused on a set of users having similar interests. Biased ratings of the items are also introduced in the system. The results show that although segment attack has impact on item based collaborative filtering, still it has higher robustness than user based collaborative filtering approach.
引用
收藏
页码:388 / 392
页数:5
相关论文
共 13 条
[1]  
[Anonymous], 2005, P 2005 WEBKDD WORKSH
[2]  
Burke R., 2005, DATA MINING
[3]  
Herlocker J., 1999, P 22 ACM C RES DEV I
[4]  
Lam S., 2004, P 13 INT C WORLD WID, P393, DOI DOI 10.1145/988672.988726
[5]   Amazon.com recommendation - Item-to-item collaborative filtering [J].
Linden, G ;
Smith, B ;
York, J .
IEEE INTERNET COMPUTING, 2003, 7 (01) :76-80
[6]  
Massa P, 2007, RECSYS 07: PROCEEDINGS OF THE 2007 ACM CONFERENCE ON RECOMMENDER SYSTEMS, P17
[7]   Attacks and remedies in collaborative recommendation [J].
Mobasher, Bamshad ;
Burke, Robin ;
Bhaumik, Runa ;
Sandvig, J. J. .
IEEE INTELLIGENT SYSTEMS, 2007, 22 (03) :56-63
[8]  
O'Donovan J., 2005, IUI
[9]  
OMahony M.P., 2005, AAAI, P334
[10]  
Sarwar B, 2001, P 10 INT C WORLD WID, P285