[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Spotting anomalous ratings for rating systems by analyzing target users and items

Published: 31 May 2017 Publication History

Abstract

Online rating systems play an important role in recommender systems. Collaborative filtering recommender systems are highly vulnerable to shilling attacks in reality. Although attack detection based on the attacks have been extensively researched over the last decade, the studies on this issue have not reached an end. Furthermore, only using the existing features is not easy to improve their detection performance. In this paper, we present an unsupervised detection method to defend such attacks, which consists of two stages. Based on the existing features of user and item, more effective features are selected using adaptive structure learning which takes advantage of adaptive local and global structure learning. In the first stage, suspected users are determined by exploiting a density-based clustering method based on the selected features. Then, the selected features of item are applied to find out suspicious items in order to further spot the concerned attackers based on the result of the first stage. Finally, the attackers can be detected. Extensive experiments on the MovieLens-100K dataset demonstrate the effectiveness of the proposed approach as compare to competing methods. It is noteworthy that discovering interesting findings including anomalous ratings and items on Amazon dataset also is investigated.

References

[1]
G. Adomavicius, A. Tuzhilin, Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions, IEEE Trans. Knowl. Data Eng., 17 (2005) 734-749.
[2]
A. Bellogn, P. Castells, I. Cantador, Neighbor selection and weighting in user-based collaborative filtering: a performance prediction approach, ACM Trans. Web, 8 (2014) 307-323.
[3]
A. Bilge, Z. Ozdemir, H. Polat, A novel shilling attack detection method, Proc. Comput. Sci., 31 (2014) 165-174.
[4]
J. Bobadilla, F. Ortega, A. Hernando, J. Bernal, A collaborative filtering approach to mitigate the new user cold start problem, Knowl. Based Syst., 26 (2012) 225-238.
[5]
J. Bobadilla, F. Ortega, A. Hernando, A. Gutirrez, Recommender systems survey, Knowl. Based Syst., 46 (2013) 109-132.
[6]
K. Bryan, M. OMahony, P. Cunningham, Unsupervised retrieval of attack profiles in collaborative recommender systems, 2008.
[7]
R. Burke, B. Mobasher, C. Williams, Classification features for attack detection in collaborative recommender systems, 2006.
[8]
F. Cacheda, V. Carneiro, D. Fernndez, V. Formoso, Comparison of collaborative filtering algorithms: limitations of current techniques and proposals for scalable, high-performance recommender systems, ACM Trans. Web, 5 (2011).
[9]
J. Cao, Z. Wu, B. Mao, Y. Zhang, Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system, World Wide Web, 16 (2013) 729-748.
[10]
P. Chirita, W. Nejdl, C. Zamfir, Preventing shilling attacks in online recommender systems, 2005.
[11]
K. Choi, Y. Suh, A new similarity function for selecting neighbors for each target item in collaborative filtering, Knowl. Based Syst., 37 (2013) 146-153.
[12]
C. Chung, P. Hsu, S. Huang, P: a novel approach to filter out malicious rating profiles from recommender systems, J. Decis. Support Syst., 55 (2013) 314-325.
[13]
L. Du, Y.D. Shen, Unsupervised feature selection with adaptive structure learning, 2015.
[14]
N. Gnnemann, S. Gnnemann, C. Faloutsos, Robust multivariate autoregression for anomaly detection in dynamic product ratings, 2014.
[15]
S. Gnnemann, N. Gnnemann, C. Faloutsos, Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution, 2014.
[16]
I. Gunes, C. Kaleli, A. Bilge, H. Polat, Shilling attacks against recommender systems: a comprehensive survey, Artif. Intell. Rev., 42 (2012) 1-33.
[17]
F. He, X.Wang, B. Liu, Attack detection by rough set theory in recommendation system, 2010.
[18]
A. Hernando, J. Bobadillaa, F. Ortega, A non negative matrix factorization for collaborative filtering recommender systems based on a Bayesian probabilistic model, Knowl. Based Syst., 97 (2016) 188-202.
[19]
S. Huang, M. Shang, S. Cai, A hybrid decision approach to detect profile injection attacks in collaborative recommender systems, 2012.
[20]
N. Hurley, Z. Cheng, M. Zhang, Statistical attack detection, 2009.
[21]
M. Jiang, P. Cui, A. Beutel, C. Faloutsos, S. Yang, Catchsync: catching synchronized behavior in large directed graphs, 2014.
[22]
S. Lam, J. Riedl, Shilling recommender systems for fun and profit, 2004.
[23]
B. Li, L. Chen, X. Zhu, C. Zhang, Noisy but non-malicious user detection in social recommender systems, World Wide Web, 16 (2013) 677-699.
[24]
C. Li, Z. Luo, Detection of shilling attacks in collaborative filtering recommender systems, 2011.
[25]
H. Liu, Z. Hu, A. Mian, H. Tian, X. Zhu, A new user similarity model to improve the accuracy of collaborative filtering, Knowl. Based Syst., 56 (2014) 156-166.
[26]
J. Lu, D. Wu, M. Mao, W. Wang, G. Zhang, Recommender system application developments: a survey, Decis. Support Syst., 74 (2015) 12-32.
[27]
J. McAuley, R. Pandey, J. Leskovec, Inferring networks ofsubstitutable and complementary products, ACM, 2015.
[28]
J. McAuley, C. Targett, J. Shi, A. van den Hengel, Image-based recommendations on styles and substitutes, SIGIR (2015).
[29]
B. Mehta, Unsupervised shilling detection for collaborative filtering, Assoc. Adv. Artif. Intell. (2007) 1402-1407.
[30]
B. Mehta, T. Hofmann, P. Fankhauser, Lies and propaganda: detecting spam users in collaborative filtering, 2007.
[31]
B. Mehta, W. Nejdl, Unsupervised strategies for shilling detection and robust collaborative filtering, User Model. User-Adapt. Interact., 19 (2009) 65-97.
[32]
B. Mobasher, R. Burke, R. Bhaumik, C. Williams, Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness, ACM Trans. Internet Technol. (TOIT), 7 (2007) 38.
[33]
B. Mobasher, R. Burke, J. Sandvig, Model-based collaborative filtering as a defense against profile injection attacks, Am. Assoc. Artif. Intell., 6 (2006) 1388.
[34]
B. Mobasher, R. Burke, C. Williams, R. Bhaumik, Analysis and detection of segment-focused attacks against collaborative recommendation, Adv. Web Min. Web Usage Anal., 4198 (2006) 96-118.
[35]
M. Morid, M. Shajari, Defending recommender systems by influence analysis, Inf. Retr., 17 (2013) 137-152.
[36]
G. Noh, H. Oh, Y. Kang, C. Kim, PSD: practical sybil detection schemes using stickiness and persistence in online recommender systems, Inf. Sci., 281 (2014) 66-84.
[37]
C.E. Seminario, Accuracy and robustness impacts of power user attacks on collaborative recommender systems, 2013.
[38]
C.E. Seminario, D.C. Wilson, Assessing impacts of a power user attack on a matrix factorization collaborative recommender system, 2014.
[39]
C.E. Seminario, D.C. Wilson, Attacking item-based recommender systems with power items, 2014.
[40]
X. Su, H. Zeng, Z. Chen, Finding group shilling in recommendation system, 2005.
[41]
P. Symeonidis, A. Nanopoulus, Y. Manolopoulus, Movieexplain: a recommender system with explanations, 2009.
[42]
Y. Wang, L. Zhang, H. Tao, Z. Wu, J. Cao, A comparative study of shilling attack detectors for recommender systems, 2015.
[43]
C.A. Williams, B. Mobasher, R. Burke, Defending recommender systems: detection of profile injection attacks, SOCA, 1 (2007) 157-170.
[44]
C.A. Williams, B. Mobasher, R. Burke, R. Bhaumik, Detecting profile injection attacksin collaborative filtering: a classification-based approach, Springer Berlin Heidelberg, 2006.
[45]
D.C. Wilson, C.E. Seminario, Evil twins: modeling power users in attacks on recommender systems, Springer International Publishing, 2014.
[46]
D.C. Wilson, C.E. Seminario, Mitigating power user attacks on a user-based collaborative recommender system, Assoc. Adv. Artif. Intell. (2015).
[47]
Z.A. Wu, Y.Q. Wang, J. Cao, A survey on shilling attack models and detection techniques for recommender systems, Sci. China, 59 (2014) 551-560.
[48]
Z.A. Wu, J.J. Wu, J. Cao, D.C. Tao, HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation, 2012.
[49]
H. Xia, B. Fang, M. Gao, H. Ma, Y. Tang, J. Wen, A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique, Inf. Sci., 306 (2015) 150-165.
[50]
Z. Yang, L. Xu, Z. Cai, Z. Xu, Re-scale AdaBoost for attack detection in collaborative filtering recommender systems, Knowl. Based Syst., 100 (2016) 74-88.
[51]
F. Zhang, Q. Zhou, A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems, J. Comput., 7 (2012) 226-234.
[52]
F. Zhang, Q. Zhou, HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems, Knowl. Based Syst., 65 (2014) 96-105.
[53]
S. Zhang, A. Chakrabarti, J. Ford, F. Makedon, Attack detection in time series for recommender systems, 2006.
[54]
X. Zhang, T.M.D. Lee, G. Pitsilis, Securing recommender systems against shilling attacks using social-based clustering, J. Comput. Sci. Technol., 28 (2013) 616-624.
[55]
Y. Zhang, Y. Tan, M. Zhang, Y. Liu, C. Tat-Seng, S. Ma, Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation, 2015.
[56]
Z. Zhang, S. Kulkarni, Graph-based detection of shilling attacks in recommender systems, 2013.
[57]
Z. Zhang, S.R. Kulkarni, Detection of shilling attacks in recommender systems via spectral clustering, 2014.
[58]
W. Zhou, Y.S. Koh, J.H. Wen, S. Burki, G. Dobbie, Detection of abnormal profiles on group attacks in recommender systems, 2014.
[59]
W. Zhou, J. Wen, Y.S. Koh, S. Alam, G. Dobbie, Attack detection in recommender systems based on target item analysis, 2014.
[60]
W. Zhou, J. Wen, Y.S. Koh, Q. Xiong, M. Gao, G. Dobbie, S. Alam, Shilling attacks detection inrecommender systems based on target item analysis, PloS One, 10 (2015) e0130968.
[61]
W. Zhou, J. Wen, Q. Xiong, M. Gao, J. Zeng, SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems, Neurocomputing, 210 (2016) 197-205.

Cited By

View all
  • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/367732857:1(1-39)Online publication date: 7-Oct-2024
  • (2024)Detecting Unknown Shilling Attacks in Recommendation SystemsWireless Personal Communications: An International Journal10.1007/s11277-024-11401-y137:1(259-286)Online publication date: 1-Jul-2024
  • (2022)Rating behavior evaluation and abnormality forensics analysis for injection attack detectionJournal of Intelligent Information Systems10.1007/s10844-021-00689-y59:1(93-119)Online publication date: 1-Aug-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Neurocomputing
Neurocomputing  Volume 240, Issue C
May 2017
201 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 31 May 2017

Author Tags

  1. Adaptive structure learning
  2. Anomaly detection
  3. Recommender system
  4. Shilling attack

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/367732857:1(1-39)Online publication date: 7-Oct-2024
  • (2024)Detecting Unknown Shilling Attacks in Recommendation SystemsWireless Personal Communications: An International Journal10.1007/s11277-024-11401-y137:1(259-286)Online publication date: 1-Jul-2024
  • (2022)Rating behavior evaluation and abnormality forensics analysis for injection attack detectionJournal of Intelligent Information Systems10.1007/s10844-021-00689-y59:1(93-119)Online publication date: 1-Aug-2022
  • (2020)Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2020.297702315(2766-2781)Online publication date: 24-Mar-2020
  • (2019)Detecting shilling attacks in social recommender systems based on time series analysis and trust featuresKnowledge-Based Systems10.1016/j.knosys.2019.04.012178:C(25-47)Online publication date: 15-Aug-2019
  • (2019)Collaborative filtering recommendation based on trust and emotionJournal of Intelligent Information Systems10.1007/s10844-018-0517-453:1(113-135)Online publication date: 20-Sep-2019
  • (2018)Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender SystemsSecurity and Communication Networks10.1155/2018/81746032018Online publication date: 11-Oct-2018
  • (2018)Uncovering anomalous rating behaviors for rating systemsNeurocomputing10.1016/j.neucom.2018.05.001308:C(205-226)Online publication date: 25-Sep-2018

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media