A novel Kalman Filter based shilling attack detection algorithm

被引:3
|
作者
Liu, Xin [1 ,2 ]
Xiao, Yingyuan [1 ]
Jiao, Xu [1 ,2 ]
Zheng, Wenguang [1 ,2 ]
Ling, Zihao [1 ,2 ]
机构
[1] Tianjin Univ Technol, Tianjin Key Lab Intelligence Comp & Novel Softwar, Tianjin 300384, Peoples R China
[2] Tianjin Univ Technol, Key Lab Comp Vis & Syst, Minist Educ, Tianjin 300384, Peoples R China
关键词
collaborative filtering; recommendation system; shilling attack; attack detection; Kalman Filter;
D O I
10.3934/mbe.2020081
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Collaborative filtering has been widely used in recommendation systems to recommend items that users might like. However, collaborative filtering based recommendation systems are vulnerable to shilling attacks. Malicious users tend to increase or decrease the recommended frequency of target items by injecting fake profiles. In this paper, we propose a Kalman filter-based attack detection model, which statistically analyzes the difference between the actual rating and the predicted rating calculated by this model to find the potential abnormal time period. The Kalman Filter filters out suspicious ratings based on the abnormal time period and identifies suspicious users based on the source of these ratings. The experimental results show that our method performs much better detection performance for the shilling attack than the traditional methods.
引用
收藏
页码:1558 / 1577
页数:20
相关论文
共 50 条
  • [1] Shilling Attack Detection Algorithm based on Genetic Optimization
    Li, Tao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 273 - 285
  • [2] A novel clustered-based detection method for shilling attack in private environments
    Gunes, Ihsan
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [3] Shilling Attack Detection Algorithm based on Non-random-missing Mechanism
    Li, Man
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 115 - 126
  • [4] Command current detection algorithm based on Kalman filter
    Li, Falei
    Cheng, Xingong
    Zong, Xiju
    Li, Lisheng
    PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 1048 - 1053
  • [5] A Novel Shilling Attack Detection Method Based on T-Distribution over the Dynamic Time Intervals
    Yuan, Wanqiao
    Xiao, Yingyuan
    Jiao, Xu
    Sun, Chenchen
    Zheng, Wenguang
    Wang, Hongya
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2020, 2020, 12115 : 225 - 240
  • [6] UNSUPERVISED SHILLING ATTACK DETECTION MODEL BASED ON RATED ITEM CORRELATION ANALYSIS
    Chen, Keke
    Chan, Patrick R. K.
    Yeung, Daniel S.
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 2, 2018, : 667 - 672
  • [7] Shilling attack detection in binary data: a classification approach
    Zeynep Batmaz
    Burcu Yilmazel
    Cihan Kaleli
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 2601 - 2611
  • [8] Shilling attack detection in binary data: a classification approach
    Batmaz, Zeynep
    Yilmazel, Burcu
    Kaleli, Cihan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (06) : 2601 - 2611
  • [9] Robust Recommendation Method Based on Shilling Attack Detection and Matrix Factorization Model
    Hu, Yu-qi
    Liu, Kai
    Zhang, Fu-zhi
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017), 2017, : 300 - 307
  • [10] Detection of Shilling Attack Based on Bayesian Model and User Embedding
    Yang, Fan
    Gao, Min
    Yu, Junliang
    Song, Yuqi
    Wang, Xinyi
    2018 IEEE 30TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2018, : 639 - 646