Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system

被引:0
作者
Jie Cao
Zhiang Wu
Bo Mao
Yanchun Zhang
机构
[1] Nanjing University of Finance and Economics,Jiangsu Provincial Key Laboratory of E
[2] Victoria University,Business
来源
World Wide Web | 2013年 / 16卷
关键词
semi-supervised learning; shilling attack detection; collaborative filtering; naïve Bayes; EM;
D O I
暂无
中图分类号
学科分类号
摘要
Collaborative filtering (CF) technique is capable of generating personalized recommendations. However, the recommender systems utilizing CF as their key algorithms are vulnerable to shilling attacks which insert malicious user profiles into the systems to push or nuke the reputations of targeted items. There are only a small number of labeled users in most of the practical recommender systems, while a large number of users are unlabeled because it is expensive to obtain their identities. In this paper, Semi-SAD, a new semi-supervised learning based shilling attack detection algorithm is proposed to take advantage of both types of data. It first trains a naïve Bayes classifier on a small set of labeled users, and then incorporates unlabeled users with EM-λ to improve the initial naïve Bayes classifier. Experiments on MovieLens datasets are implemented to compare the efficiency of Semi-SAD with supervised learning based detector and unsupervised learning based detector. The results indicate that Semi-SAD can better detect various kinds of shilling attacks than others, especially against obfuscated and hybrid shilling attacks.
引用
收藏
页码:729 / 748
页数:19
相关论文
共 36 条
  • [1] Cacheda F(2011)Comparison of collaborative filtering algorithms: limitations of current techniques and proposals for scalable, high-performance recommender systems ACM Trans. Web (TWEB’11) 5 3-34
  • [2] Carneiro V(1995)On the exponential value of labeled samples Pattern Recogn. Lett. 16 105-111
  • [3] Fernandez D(2012)Exploring latent browsing graph for question answering recommendation WWWJ 24 117-131
  • [4] Formoso V(2012)Shilling attack detection—a new approach for a trustworthy recommender system INFORMS J. Comput. 14 187-215
  • [5] Castelli V(2011)A probabilistic rating inference framework for mining user preferences from reviews WWWJ 10 415-441
  • [6] Cover TM(2007)Analysis and classification of multi-criteria recommender systems WWWJ 39 103-134
  • [7] Chiang MF(2000)Text classification from labeled and unlabeled documents using em Machine Learn. 32 1087-1095
  • [8] Peng WC(1994)The effect of unlabeled samples in reducing the small sample size problem and mitigating the hughes phenomenon IEEE Trans. Geosci. Remote Sens. 14 1-37
  • [9] Yu PS(2008)Top 10 algorithms in data mining Knowl. Inf. Syst. 20 191-220
  • [10] Lee J(2010)COG: local decomposition for rare class analysis Data Min. Knowl. Discovery 14 1-25