BS-SC: An Unsupervised Approach for Detecting Shilling Profiles in Collaborative Recommender Systems

被引:13
作者
Cai, Hongyun [1 ,2 ]
Zhang, Fuzhi [1 ,3 ]
机构
[1] Yanshan Univ, Sch Informat Sci & Engn, Qinhuangdao 066000, Hebei, Peoples R China
[2] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071000, Peoples R China
[3] Key Lab Comp Virtual Technol & Syst Integrat Hebe, Qinhuangdao 066000, Hebei, Peoples R China
基金
中国国家自然科学基金;
关键词
Feature extraction; Recommender systems; Collaboration; Training; Correlation; Clustering algorithms; Detection algorithms; Collaborative recommender systems; shilling attacks detection; behavior analysis; spectral clustering; ATTACKS;
D O I
10.1109/TKDE.2019.2946247
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Collaborative recommender systems are vulnerable to shilling attacks. To address this issue, many methods including supervised and unsupervised have been proposed. However, supervised detection methods require training classifiers and they only apply to detect known types of attacks. The existing unsupervised detection methods need to know the prior knowledge of attacks, otherwise they suffer from low detection precision. In this paper, we present BS-SC, an unsupervised approach for detecting shilling profiles, which does not need to know the attack size or to label the candidate spammers. BS-SC starts from an in-depth analysis of user behaviors and uses two key mechanisms (i.e., behavior features extraction and behavior similarity matrix clustering) to distinguish shilling profiles from genuine ones. The behavior features reflect the behavior difference between genuine and shilling profiles, and the behavior similarity matrix clustering is to cluster shilling profiles based on their highly similar behaviors. Experimental results on the MovieLens and the sampled Amazon review datasets indicate that BS-SC outperforms the baseline unsupervised approaches, even when the prior knowledge is given for them.
引用
收藏
页码:1375 / 1388
页数:14
相关论文
共 45 条
[1]  
[Anonymous], 2005, WIDM
[2]  
[Anonymous], 2006, P 12 ACM SIGKDD INT, DOI DOI 10.1145/1150402.1150465
[3]   Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system [J].
Cao, Jie ;
Wu, Zhiang ;
Mao, Bo ;
Zhang, Yanchun .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2013, 16 (5-6) :729-748
[4]  
Cong Li, 2011, 2011 International Conference of Soft Computing and Pattern Recognition, P190, DOI 10.1109/SoCPaR.2011.6089138
[5]   Uncovering and Predicting Human Behaviors [J].
Cui, Peng ;
Liu, Huan ;
Aggarwal, Charu ;
Wang, Fei .
IEEE INTELLIGENT SYSTEMS, 2016, 31 (02) :77-78
[6]   Robust Multivariate Autoregression for Anomaly Detection in Dynamic Product Ratings [J].
Gunnemann, Nikou ;
Gunnemann, Stephan ;
Faloutsos, Christos .
WWW'14: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2014, :361-371
[7]  
Heinrich G., 2005, PARAMETER ESTIMATION
[8]  
Hurley N., 2009, Proceedings of the third ACM conference on Recommender systems, P149, DOI DOI 10.1145/1639714.1639740
[9]   FEMA: Flexible Evolutionary Multi-faceted Analysis for Dynamic Behavioral Pattern Discovery [J].
Jiang, Meng ;
Cui, Peng ;
Wang, Fei ;
Xu, Xinran ;
Zhu, Wenwu ;
Yang, Shiqiang .
PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, :1186-1195
[10]  
Jing Qian, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P3057, DOI 10.1109/ICASSP.2014.6854162