Cargando…

Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences be...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhou, Wei, Wen, Junhao, Koh, Yun Sing, Xiong, Qingyu, Gao, Min, Dobbie, Gillian, Alam, Shafiq
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4519300/
https://www.ncbi.nlm.nih.gov/pubmed/26222882
http://dx.doi.org/10.1371/journal.pone.0130968
_version_ 1782383492412211200
author Zhou, Wei
Wen, Junhao
Koh, Yun Sing
Xiong, Qingyu
Gao, Min
Dobbie, Gillian
Alam, Shafiq
author_facet Zhou, Wei
Wen, Junhao
Koh, Yun Sing
Xiong, Qingyu
Gao, Min
Dobbie, Gillian
Alam, Shafiq
author_sort Zhou, Wei
collection PubMed
description Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.
format Online
Article
Text
id pubmed-4519300
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-45193002015-07-31 Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis Zhou, Wei Wen, Junhao Koh, Yun Sing Xiong, Qingyu Gao, Min Dobbie, Gillian Alam, Shafiq PLoS One Research Article Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. Public Library of Science 2015-07-29 /pmc/articles/PMC4519300/ /pubmed/26222882 http://dx.doi.org/10.1371/journal.pone.0130968 Text en © 2015 Zhou et al http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited.
spellingShingle Research Article
Zhou, Wei
Wen, Junhao
Koh, Yun Sing
Xiong, Qingyu
Gao, Min
Dobbie, Gillian
Alam, Shafiq
Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
title Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
title_full Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
title_fullStr Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
title_full_unstemmed Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
title_short Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
title_sort shilling attacks detection in recommender systems based on target item analysis
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4519300/
https://www.ncbi.nlm.nih.gov/pubmed/26222882
http://dx.doi.org/10.1371/journal.pone.0130968
work_keys_str_mv AT zhouwei shillingattacksdetectioninrecommendersystemsbasedontargetitemanalysis
AT wenjunhao shillingattacksdetectioninrecommendersystemsbasedontargetitemanalysis
AT kohyunsing shillingattacksdetectioninrecommendersystemsbasedontargetitemanalysis
AT xiongqingyu shillingattacksdetectioninrecommendersystemsbasedontargetitemanalysis
AT gaomin shillingattacksdetectioninrecommendersystemsbasedontargetitemanalysis
AT dobbiegillian shillingattacksdetectioninrecommendersystemsbasedontargetitemanalysis
AT alamshafiq shillingattacksdetectioninrecommendersystemsbasedontargetitemanalysis