Preventing shilling attacks in online recommender systems

PA Chirita, W Nejdl, C Zamfir - Proceedings of the 7th annual ACM …, 2005 - dl.acm.org
Proceedings of the 7th annual ACM international workshop on Web information …, 2005dl.acm.org
Collaborative filtering techniques have been successfully employed in recommender
systems in order to help users deal with information overload by making high quality
personalized recommendations. However, such systems have been shown to be vulnerable
to attacks in which malicious users with carefully chosen profiles are inserted into the system
in order to push the predictions of some targeted items. In this paper we propose several
metrics for analyzing rating patterns of malicious users and evaluate their potential for …
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalized recommendations. However, such systems have been shown to be vulnerable to attacks in which malicious users with carefully chosen profiles are inserted into the system in order to push the predictions of some targeted items. In this paper we propose several metrics for analyzing rating patterns of malicious users and evaluate their potential for detecting such shilling attacks. Building upon these results, we propose and evaluate an algorithm for protecting recommender systems against shilling attacks. The algorithm can be employed for monitoring user ratings and removing shilling attacker profiles from the process of computing recommendations, thus maintaining the high quality of the recommendations.
ACM Digital Library