A novel shilling attack on black-box recommendation systems for multiple targets

被引:0
|
作者
Shuangyu Liu [1 ]
Siyang Yu [1 ]
Huan Li [2 ]
Zhibang Yang [1 ]
Mingxing Duan [3 ]
Xiangke Liao [1 ]
机构
[1] Hunan University,School of Information Science and Engineering
[2] Hunan University of Finance and Economics,College of Information Technology and Management
[3] Changsha University,Hunan Province Key Laboratory of Industrial Internet Technology and Security
[4] Hunan University,Shenzhen Institute
[5] National University of Defense Technology,School of Computer Science
关键词
Recommender system; Shilling attack; GAN; Multi-target attack;
D O I
10.1007/s00521-024-10798-8
中图分类号
学科分类号
摘要
In the digital era, e-platforms ubiquitously deploy recommendation systems, utilizing machine learning paradigms to tailor content according to user preferences and needs. Yet, the integrity of these systems is often compromised by shilling attacks, where malicious entities inject fake user profiles to skew product exposure and sales. This vulnerability has catalyzed research efforts to bolster the robustness and security of recommendation systems, primarily through controlled attacks and reinforcement training. This paper introduces an innovative approach to combat the inefficiency of traditional single-target shilling attacks. We propose a novel multi-target shilling strategy for black-box recommendation systems, capable of generating convincing and aggressive fake user profiles. Given the complexity of the recommendation system algorithms, we employ surrogate models to replicate and understand the target system’s behavior. The surrogate model is then subjected to attacks using our proposed methodology. An attack is deemed successful when it achieves an 80% or higher success rate against the surrogate, preluding an attack on the actual recommendation system. Our model, RWA-GAN, stands out by integrating two components: a generative adversarial network (GAN) for crafting realistic fake user profiles, and a mechanism to enhance attack success rates. This dual approach not only expedites the attack process but also ensures the generation of more authentic and well-distributed fake profiles, making the model easier to migrate. Additionally, the paper delineates several defense strategies against such attacks, contributing significantly to the discourse on enhancing the robustness of recommender systems.
引用
收藏
页码:3399 / 3417
页数:18
相关论文
共 50 条
  • [31] Black-Box Adversarial Attack via Overlapped Shapes
    Williams, Phoenix
    Li, Ke
    Min, Geyong
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2022, 2022, : 467 - 468
  • [32] Black-box Bayesian adversarial attack with transferable priors
    Shudong Zhang
    Haichang Gao
    Chao Shu
    Xiwen Cao
    Yunyi Zhou
    Jianping He
    Machine Learning, 2024, 113 : 1511 - 1528
  • [33] Adaptive hyperparameter optimization for black-box adversarial attack
    Guan, Zhenyu
    Zhang, Lixin
    Huang, Bohan
    Zhao, Bihe
    Bian, Song
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1765 - 1779
  • [34] Black-box Universal Adversarial Attack on Text Classifiers
    Zhang, Yu
    Shao, Kun
    Yang, Junan
    Liu, Hui
    2021 2ND ASIA CONFERENCE ON COMPUTERS AND COMMUNICATIONS (ACCC 2021), 2021, : 1 - 5
  • [35] BASAR:Black-box Attack on Skeletal Action Recognition
    Diao, Yunfeng
    Shao, Tianjia
    Yang, Yong-Liang
    Zhou, Kun
    Wang, He
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 7593 - 7603
  • [36] Black-Box Adversarial Attack on Time Series Classification
    Ding, Daizong
    Zhang, Mi
    Feng, Fuli
    Huang, Yuanmin
    Jiang, Erling
    Yang, Min
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 6, 2023, : 7358 - 7368
  • [37] Probabilistic verification for "black-box" systems
    Younes, HLS
    COMPUTER AIDED VERIFICATION< PROCEEDINGS, 2005, 3576 : 253 - 265
  • [38] NATURAL SYSTEMS VS THE BLACK-BOX
    LOGSDON, G
    BIOCYCLE, 1989, 30 (06) : 68 - 69
  • [39] EMS SYSTEMS - OPENING THE BLACK-BOX
    MAIO, RF
    ANNALS OF EMERGENCY MEDICINE, 1993, 22 (04) : 730 - 731
  • [40] IMPGA: An Effective and Imperceptible Black-Box Attack Against Automatic Speech Recognition Systems
    Liang, Luopu
    Guo, Bowen
    Lian, Zhichao
    Li, Qianmu
    Jing, Huiyun
    WEB AND BIG DATA, PT III, APWEB-WAIM 2022, 2023, 13423 : 349 - 363