Identifying attack models for securing cluster-based recommendation system

被引:0
|
作者
Ahmad A. [1 ]
Ahmad T. [1 ]
Tripathi I. [1 ]
机构
[1] Department of Computer Engineering, Jamia Millia Islamia, New Delhi
来源
Recent Patents on Engineering | 2020年 / 14卷 / 03期
关键词
Attack models; Collaborative filtering; Game theory; Recommendation system; Security; Shapley value;
D O I
10.2174/1872212114666200403091053
中图分类号
学科分类号
摘要
The immense growth of information has led to the wide usage of recommender systems for retrieving relevant information. One of the widely used methods for recommendation is collaborative filtering. However, such methods suffer from two problems, scalability and sparsity. In the proposed research, the two issues of collaborative filtering are addressed and a cluster-based recommender system is proposed. For the identification of potential clusters from the underlying network, the Shapley value concept is used, which divides users into different clusters. After that, the recommendation algorithm is performed in every respective cluster. The proposed system recommends an item to a specific user based on the ratings of the item’s different attributes. Thus, it reduces the running time of the overall algorithm, since it avoids the overhead of computation involved when the algorithm is executed over the entire dataset. Besides, the security of the recommender system is one of the major concerns nowadays. Attackers can come in the form of ordinary users and introduce bias in the system to force the system function that is advantageous for them. In this paper, we identify different attack models that could hamper the security of the proposed cluster-based recommender system. The efficiency of the proposed research is validated by conducting experiments on student dataset. © 2020 Bentham Science Publishers.
引用
收藏
页码:324 / 338
页数:14
相关论文
共 50 条
  • [41] On optimisation of cluster-based sensor network tracking system
    Wang, Yongcai
    Zhao, Qianchuan
    Zheng, Dazhong
    Guan, Xiaohong
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2013, 14 (03) : 145 - 157
  • [42] The Cluster-Based Time-Aware Web System
    1600, Springer Verlag (431):
  • [43] A cluster-based approach for identifying east Asian economies: A foundation for monetary integration
    Yuen, H
    MODSIM 2003: INTERNATIONAL CONGRESS ON MODELLING AND SIMULATION, VOLS 1-4: VOL 1: NATURAL SYSTEMS, PT 1; VOL 2: NATURAL SYSTEMS, PT 2; VOL 3: SOCIO-ECONOMIC SYSTEMS; VOL 4: GENERAL SYSTEMS, 2003, : 1368 - 1373
  • [44] FCER: A Federated Cloud-Edge Recommendation Framework With Cluster-Based Edge Selection
    Wu, Jiang
    Yang, Yunchao
    Hu, Miao
    Zhou, Yipeng
    Wu, Di
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (03) : 1731 - 1743
  • [45] Entropy-based DDoS Attack Detection in Cluster-based Mobile Ad Hoc Networks
    Deepa
    Dhindsa, Kanwalvir Singh
    Singh, Karanbir
    AD HOC & SENSOR WIRELESS NETWORKS, 2021, 49 (3-4) : 269 - 288
  • [46] Securing Untrusted Full-Duplex Relay Channels in the Presence of Multiple External Cluster-Based Eavesdroppers
    Mabrouk, Asma
    El Shafie, Ahmed
    Tourki, Kamel
    Al-Dhahir, Naofal
    Hamdi, Noureddine
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 665 - 668
  • [47] SCFS-securing flying ad hoc network using cluster-based trusted fuzzy scheme
    Gupta, Shikha
    Sharma, Neetu
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (03) : 3743 - 3762
  • [48] SCFS-securing flying ad hoc network using cluster-based trusted fuzzy scheme
    Shikha Gupta
    Neetu Sharma
    Complex & Intelligent Systems, 2024, 10 : 3743 - 3762
  • [49] EVALUATION OF CLUSTER-BASED RECTANGULAR PULSES POINT PROCESS MODELS FOR RAINFALL
    VELGHE, T
    TROCH, PA
    DETROCH, FP
    VANDEVELDE, J
    WATER RESOURCES RESEARCH, 1994, 30 (10) : 2847 - 2857
  • [50] Clus-DR: Cluster-based pre-trained model for diverse recommendation generation
    Yadav, Naina
    Pal, Sukomal
    Singh, Anil Kumar
    Singh, Kartikey
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) : 6385 - 6399