A novel shilling attack on black-box recommendation systems for multiple targets

被引:0
|
作者
Shuangyu Liu [1 ]
Siyang Yu [1 ]
Huan Li [2 ]
Zhibang Yang [1 ]
Mingxing Duan [3 ]
Xiangke Liao [1 ]
机构
[1] Hunan University,School of Information Science and Engineering
[2] Hunan University of Finance and Economics,College of Information Technology and Management
[3] Changsha University,Hunan Province Key Laboratory of Industrial Internet Technology and Security
[4] Hunan University,Shenzhen Institute
[5] National University of Defense Technology,School of Computer Science
关键词
Recommender system; Shilling attack; GAN; Multi-target attack;
D O I
10.1007/s00521-024-10798-8
中图分类号
学科分类号
摘要
In the digital era, e-platforms ubiquitously deploy recommendation systems, utilizing machine learning paradigms to tailor content according to user preferences and needs. Yet, the integrity of these systems is often compromised by shilling attacks, where malicious entities inject fake user profiles to skew product exposure and sales. This vulnerability has catalyzed research efforts to bolster the robustness and security of recommendation systems, primarily through controlled attacks and reinforcement training. This paper introduces an innovative approach to combat the inefficiency of traditional single-target shilling attacks. We propose a novel multi-target shilling strategy for black-box recommendation systems, capable of generating convincing and aggressive fake user profiles. Given the complexity of the recommendation system algorithms, we employ surrogate models to replicate and understand the target system’s behavior. The surrogate model is then subjected to attacks using our proposed methodology. An attack is deemed successful when it achieves an 80% or higher success rate against the surrogate, preluding an attack on the actual recommendation system. Our model, RWA-GAN, stands out by integrating two components: a generative adversarial network (GAN) for crafting realistic fake user profiles, and a mechanism to enhance attack success rates. This dual approach not only expedites the attack process but also ensures the generation of more authentic and well-distributed fake profiles, making the model easier to migrate. Additionally, the paper delineates several defense strategies against such attacks, contributing significantly to the discourse on enhancing the robustness of recommender systems.
引用
收藏
页码:3399 / 3417
页数:18
相关论文
共 50 条
  • [1] Reverse Attack: Black-box Attacks on Collaborative Recommendation
    Zhang, Yihe
    Yuan, Xu
    Li, Jin
    Lou, Jiadong
    Chen, Li
    Tzeng, Nian-Feng
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 51 - 68
  • [2] An Insider Attack on Shilling Attack Detection for Recommendation Systems
    Luo, Zhifeng
    Liang, Chen
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 277 - 280
  • [3] Shilling Black-Box Recommender Systems by Learning to Generate Fake User Profiles
    Lin, Chen
    Chen, Si
    Zeng, Meifang
    Zhang, Sheng
    Gao, Min
    Li, Hui
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (01) : 1305 - 1319
  • [4] Generating A New Shilling Attack for Recommendation Systems
    Singh, Pradeep Kumar
    Pramanik, Pijush Kanti Dutta
    Sardar, Madhumita
    Nayyar, Anand
    Masud, Mehedi
    Choudhury, Prasenjit
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 2827 - 2846
  • [5] Collaborative Denoising Shilling Attack for Recommendation Systems
    Liu, Xiaohao
    Zeng, Hualin
    Zhang, Wenli
    Yang, Long
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 1424 - 1429
  • [6] Shilling Black-box Review-based Recommender Systems through Fake Review Generation
    Chiang, Hung-Yun
    Chen, Yi-Syuan
    Song, Yun-Zhu
    Shuai, Hong-Han
    Chang, Jason S.
    PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, : 286 - 297
  • [7] SIMULATOR ATTACK plus FOR BLACK-BOX ADVERSARIAL ATTACK
    Ji, Yimu
    Ding, Jianyu
    Chen, Zhiyu
    Wu, Fei
    Zhang, Chi
    Sun, Yiming
    Sun, Jing
    Liu, Shangdong
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 636 - 640
  • [8] Black-Box Testing of Practical Movie Recommendation Systems: a Comparative Study
    Lee, Namhee
    Jung, Jason J.
    Selamat, Ali
    Hwang, Dosam
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (01) : 241 - 249
  • [9] A Black-Box Attack Model for Visually-Aware Recommender Systems
    Cohen, Rami
    Shalom, Oren Sar
    Jannach, Dietmar
    Amir, Amihood
    WSDM '21: PROCEEDINGS OF THE 14TH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2021, : 94 - 102
  • [10] Amora: Black-box Adversarial Morphing Attack
    Wang, Run
    Juefei-Xu, Felix
    Guo, Qing
    Huang, Yihao
    Xie, Xiaofei
    Ma, Lei
    Liu, Yang
    MM '20: PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, 2020, : 1376 - 1385