New Metrics for Effective Detection of Shilling Attacks in Recommender Systems

Full Text (PDF, 1237KB), PP.33-42

Views: 0 Downloads: 0

Author(s)

T.Srikanth 1,* M.Shashi 2

1. Department of CSE, GITAM University Visakhapatnam, Andhra Pradesh, India

2. Department of CS & SE, College of Engineering, Andhra University Visakhapatnam, Andhra Pradesh, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2019.04.04

Received: 22 Feb. 2019 / Revised: 17 Mar. 2019 / Accepted: 22 Apr. 2019 / Published: 8 Jul. 2019

Index Terms

Recommender Systems, Collaborative Filtering, Shilling Attacks, Preprocessing, Profile Injection, malicious users, compromised items, Shilling Profiles, Attack detection

Abstract

Collaborative filtering techniques are successfully employed in recommender systems to assist users counter the information overload by making accurate personalized recommendations. However, such systems are shown to be at risk of attacks. Malicious users can deliberately insert biased profiles in favor/disfavor of chosen item(s). The presence of the biased profiles can violate the underlying principle of the recommender algorithm and affect the recommendations.
This paper proposes two metrics namely, Rating Deviation from Mean Bias (RDMB) and Compromised Item Deviation Analysis (CIDA) for identification of malicious profiles and compromised items, respectively. A framework is developed for investigating the effectiveness of the proposed metrics. Extensive evaluation on benchmark datasets has shown that the metrics due to their high Information Gain lead to more accurate detection of shilling profiles compared to the other state of the art metrics.

Cite This Paper

T.Srikanth, M.Shashi, "New Metrics for Effective Detection of Shilling Attacks in Recommender Systems", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.11, No.4, pp. 33-42, 2019. DOI:10.5815/ijieeb.2019.04.04

Reference

[1]Bhaumik R, Williams CA, Mobasher B, Burke RD, 2006. Securing collaborative filtering against malicious attacks through anomaly detection. In Proceedings of the 4th workshop on intelligent techniques for web personalization, Boston, MA
[2]Bryan K, O’Mahony MP, Cunningham P, 2008. Unsupervised retrieval of attack profiles in collaborative recommender systems. In Proceedings of the 2nd ACM international conference on recommender systems, Lausanne, Switzerland, pp 155–162
[3]Burke RD, Mobasher B, Bhaumik R, 2005. Limited knowledge shilling attacks in collaborative filtering systems. In Proceedings of workshop on intelligent techniques for web personalization, Edinburgh, UK
[4]Burke RD, MobasherB,Williams CA, Bhaumik R ,2006. Classification features for attack detection in collaborative recommender systems. In Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, Philadelphia, PA, USA, pp 542–547
[5]Chirita PA, NejdlW, Zamfir C, 2005. Preventing shilling attacks in online recommender systems. In Proceedings of the 7th annual ACM international workshop on web information and data management, Bremen, Germany, pp 67–74
[6]Harper, F.M. and Konstan, J.A., 2016. The movielens datasets: History and context. ACM Transactions on Interactive Intelligent Systems (TiiS), 5(4), p.19.
[7]IhsanGunes, CihanKaleli, Alper Bilge, and HuseyinPolat. 2014. Shilling attacks against recommender systems: a comprehensive survey. Artif. Intell. Rev. 42, 4 ,767-799. DOI: http://dx.doi.org/10.1007/s10462-012-9364-9
[8]Jannach, D., Zanker, M., Felfernig, A. and Friedrich, G., 2010. Recommender systems: an introduction. Cambridge University Press.
[9]Koren, Y. and Bell, R., 2015. Advances in collaborative filtering. In Recommender systems handbook (pp. 77-118). Springer US.
[10]Lam SK, RiedlJT, 2004. Shilling recommender systems for fun and profit. In Proceedings of the 13th international conference on world wide web, New York, NY, USA, pp 393–402
[11]Mehta B, NejdlW, 2009. Unsupervised strategies for shilling detection and robust collaborative filtering. User Model User Adapt Interact 19(1-2):65–97
[12]Mobasher B, Burke RD, Bhaumik R, Williams CA, 2007. Towards trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans Internet Technol 7(4):23–60
[13]R Core Team, 2015. R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. URL http://www.R-project.org/.
[14]Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P. and Riedl, J., 1994. GroupLens: an open architecture for collaborative filtering of netnews. In Proceedings of the 1994 ACM conference on Computer supported cooperative work (pp. 175-186).
[15]Shardanand, U. and Maes, P., 1995. Social information filtering: algorithms for automating “word of mouth”. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 210-217). ACM Press/Addison-Wesley Publishing Co.
[16]Srikanth, T. and Shashi, M., 2019 An effective preprocessing algorithm for model building incollaborative filtering-based recommender system, Int. J. Business Intelligenceand Data Mining, Vol. 14, No. 4, pp.489–503.
[17]Tong, C., Yin, X., Li, J., Zhu, T., Lv, R., Sun, L. and Rodrigues, J.J., 2018. A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. The Computer Journal.
[18]Zhang, F., 2009. Average shilling attack against trust-based recommender systems. In Information Management, Innovation Management and Industrial Engineering, 2009 International Conference on (Vol. 4, pp. 588-591). IEEE.
[19]Zhou, W., Wen, J., Koh, Y.S., Alam, S. and Dobbie, G., 2014. Attack detection in recommender systems based on target item analysis. In Neural Networks (IJCNN), 2014 International Joint Conference on (pp. 332-339). IEEE.