[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2792838.2799666acmconferencesArticle/Chapter ViewAbstractPublication PagesrecsysConference Proceedingsconference-collections
short-paper

Nuke 'Em Till They Go: Investigating Power User Attacks to Disparage Items in Collaborative Recommenders

Published: 16 September 2015 Publication History

Abstract

Recommender Systems (RSs) can be vulnerable to manipulation by malicious users who successfully bias recommendations for their own benefit or pleasure. These are known as attacks on RSs and are typically used to either promote ("push") or disparage ("nuke") targeted items contained within the recommender's user-item dataset. Our recent work with the Power User Attack (PUA) model, determined that attackers disguised as influential power users can mount successful (from the attacker's viewpoint) push attacks against user-based, item-based, and SVD-based recommenders. However, the success of push attack vectors may not be symmetric for nuke attacks, which target the opposite effect --- reducing the likelihood that target items appear in users' top-N lists. The asymmetry between push and nuke attacks is highlighted when evaluating these attacks using traditional robustness metrics such as Rank and Prediction Shift. This paper examines the PUA attack model in the context of nuke attacks, in order to investigate the differences between push and nuke attack orientations, as well as how they are evaluated. In this work we show that the PUA is able to mount successful nuke attacks against commonly-used recommender algorithms highlighting the "nuke vs. push" asymmetry in the results.

References

[1]
R. Burke, M. P. O'Mahony, and N. J. Hurley. Robust collaborative recommendation. In F. Ricci et al., editors, Recommender Systems Handbook. Springer, 2011.
[2]
C. Desrosiers and G. Karypis. A comprehensive survey of neighborhood-based recommendations methods. In F. Ricci, L. Rokach, B. Shapira, and P. B. Kantor, editors, Recommender Systems Handbook. Springer, 2011.
[3]
J. L. Herlocker, J. A. Konstan, A. Borchers, and J. Riedl. An algorithmic framework for performing collaborative filtering. In Proc of the ACM SIGIR Conf, 1999.
[4]
J. L. Herlocker, J. A. Konstan, L. G. Terveen, and J. Riedl. Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems, 2004.
[5]
S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In Proceedings of the 13th international conference on World Wide Web. ACM, 2004.
[6]
B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Technol., 2007.
[7]
M. P. O'Mahony, N. Hurley, and G. C. M. Silvestre. Promoting recommendations: An attack on collaborative filtering. In Proceedings of DEXA'02, 2002.
[8]
P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl. GroupLens: an open architecture for collaborative filtering of netnews. In Proceedings of CSCW'94, 1994.
[9]
B. Sarwar, G. Karypis, J. Konstan, and J. Riedl. Item-based collaborative filtering recommendation algorithms. In Proceedings of the World Wide Web Conference, 2001.
[10]
C. E. Seminario and D. C. Wilson. Assessing impacts of a power user attack on a matrix factorization collaborative recommender system. In Proceedings of the 27th Florida Artificial Intelligence Research Society Conf., 2014.
[11]
C. E. Seminario and D. C. Wilson. Attacking item-based recommender systems with power items. In Proceedings of the 8th ACM Conference on Recommender Systems, RecSys '14. ACM, October 2014.
[12]
S. Wasserman and K. Faust. Social Network Analysis: Methods and Applications. Cambridge University Press, New York, NY, 1994.
[13]
D. C. Wilson and C. E. Seminario. When power users attack: assessing impacts in collaborative recommender systems. In Proceedings of the 7th ACM conference on Recommender Systems, RecSys '13. ACM, 2013.
[14]
D. C. Wilson and C. E. Seminario. Evil twins: Modeling power users in attacks on recommender systems. In Proceedings of the 22nd Conference on User Modelling, Adaptation and Personalization, 2014.

Cited By

View all

Index Terms

  1. Nuke 'Em Till They Go: Investigating Power User Attacks to Disparage Items in Collaborative Recommenders

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      RecSys '15: Proceedings of the 9th ACM Conference on Recommender Systems
      September 2015
      414 pages
      ISBN:9781450336925
      DOI:10.1145/2792838
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 September 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. attacks
      2. evaluation
      3. power users
      4. recommender systems

      Qualifiers

      • Short-paper

      Conference

      RecSys '15
      Sponsor:
      RecSys '15: Ninth ACM Conference on Recommender Systems
      September 16 - 20, 2015
      Vienna, Austria

      Acceptance Rates

      RecSys '15 Paper Acceptance Rate 28 of 131 submissions, 21%;
      Overall Acceptance Rate 254 of 1,295 submissions, 20%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Reinforcement Learning Recommendation Algorithm Based on Label Value DistributionMathematics10.3390/math1113289511:13(2895)Online publication date: 28-Jun-2023
      • (2022)Simulating real profiles for shilling attacksKnowledge-Based Systems10.1016/j.knosys.2021.107390230:COnline publication date: 22-Apr-2022
      • (2021)RMPD: Method for Enhancing the Robustness of Recommendations With Attack EnvironmentsIEEE Access10.1109/ACCESS.2021.30541229(17843-17853)Online publication date: 2021
      • (2019)BS-SC: An Unsupervised Approach for Detecting Shilling Profiles in Collaborative Recommender SystemsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.2946247(1-1)Online publication date: 2019

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media