Single-User Injection for Invisible Shilling Attack against Recommender Systems

被引:6
|
作者
Huang, Chengzhi [1 ]
Li, Hui [1 ]
机构
[1] Xiamen Univ, Minist Educ China, Key Lab Multimedia Trusted Percept & Efficient Co, Xiamen, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Shilling Attack; Recommender System; Adversarial Attack;
D O I
10.1145/3583780.3615062
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recommendation systems (RS) are crucial for alleviating the information overload problem. Due to its pivotal role in guiding users to make decisions, unscrupulous parties are lured to launch attacks against RS to affect the decisions of normal users and gain illegal profits. Among various types of attacks, shilling attack is one of the most subsistent and profitable attacks. In shilling attack, an adversarial party injects a number of well-designed fake user profiles into the system to mislead RS so that the attack goal can be achieved. Although existing shilling attack methods have achieved promising results, they all adopt the attack paradigm of multi-user injection, where some fake user profiles are required. This paper provides the first study of shilling attack in an extremely limited scenario: only one fake user profile is injected into the victim RS to launch shilling attacks (i.e., single-user injection). We propose a novel single-user injection method SUI-Attack for invisible shilling attack. SUI-Attack is a graph based attack method that models shilling attack as a node generation task over the user-item bipartite graph of the victim RS, and it constructs the fake user profile by generating user features and edges that link the fake user to items. Extensive experiments demonstrate that SUI-Attack can achieve promising attack results in single-user injection. In addition to its attack power, SUI-Attack increases the stealthiness of shilling attack and reduces the risk of being detected. We provide our implementation at: https://github.com/KDEGroup/SUI-Attack.
引用
收藏
页码:864 / 873
页数:10
相关论文
共 50 条
  • [1] Injection Shilling Attack Tool for Recommender Systems
    Rezaimehr, Fatemeh
    Dadkhah, Chitra
    2021 26TH INTERNATIONAL COMPUTER CONFERENCE, COMPUTER SOCIETY OF IRAN (CSICC), 2021,
  • [2] Unsupervised contaminated user profile identification against shilling attack in recommender system
    Zhang, Fei
    Chan, Patrick P. K.
    He, Zhi-Min
    Yeung, Daniel S.
    INTELLIGENT DATA ANALYSIS, 2024, 28 (06) : 1411 - 1426
  • [3] Analysis of Segment Shilling Attack against Trust based Recommender Systems
    Zhang, Fuguo
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9092 - 9095
  • [4] Average Shilling Attack against Trust-based Recommender Systems
    Zhang, Fuguo
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 4, PROCEEDINGS, 2009, : 588 - 591
  • [5] A Comparative Study of Shilling Attack Detectors for Recommender Systems
    Wang, Youquan
    Zhang, Lu
    Tao, Haicheng
    Wu, Zhiang
    Cao, Jie
    2015 12TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT (ICSSSM), 2015,
  • [6] Shilling attacks against recommender systems: a comprehensive survey
    Ihsan Gunes
    Cihan Kaleli
    Alper Bilge
    Huseyin Polat
    Artificial Intelligence Review, 2014, 42 : 767 - 799
  • [7] Strategies for Effective Shilling Attacks against Recommender Systems
    Ray, Sanjog
    Mahanti, Ambuj
    PRIVACY, SECURITY, AND TRUST IN KDD, 2009, 5456 : 111 - 125
  • [8] Shilling attacks against recommender systems: a comprehensive survey
    Gunes, Ihsan
    Kaleli, Cihan
    Bilge, Alper
    Polat, Huseyin
    ARTIFICIAL INTELLIGENCE REVIEW, 2014, 42 (04) : 767 - 799
  • [9] Shilling attacks against collaborative recommender systems: a review
    Si, Mingdan
    Li, Qingshan
    ARTIFICIAL INTELLIGENCE REVIEW, 2020, 53 (01) : 291 - 319
  • [10] Shilling attacks against collaborative recommender systems: a review
    Mingdan Si
    Qingshan Li
    Artificial Intelligence Review, 2020, 53 : 291 - 319