Single-User Injection for Invisible Shilling Attack against Recommender Systems

被引:6
|
作者
Huang, Chengzhi [1 ]
Li, Hui [1 ]
机构
[1] Xiamen Univ, Minist Educ China, Key Lab Multimedia Trusted Percept & Efficient Co, Xiamen, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Shilling Attack; Recommender System; Adversarial Attack;
D O I
10.1145/3583780.3615062
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recommendation systems (RS) are crucial for alleviating the information overload problem. Due to its pivotal role in guiding users to make decisions, unscrupulous parties are lured to launch attacks against RS to affect the decisions of normal users and gain illegal profits. Among various types of attacks, shilling attack is one of the most subsistent and profitable attacks. In shilling attack, an adversarial party injects a number of well-designed fake user profiles into the system to mislead RS so that the attack goal can be achieved. Although existing shilling attack methods have achieved promising results, they all adopt the attack paradigm of multi-user injection, where some fake user profiles are required. This paper provides the first study of shilling attack in an extremely limited scenario: only one fake user profile is injected into the victim RS to launch shilling attacks (i.e., single-user injection). We propose a novel single-user injection method SUI-Attack for invisible shilling attack. SUI-Attack is a graph based attack method that models shilling attack as a node generation task over the user-item bipartite graph of the victim RS, and it constructs the fake user profile by generating user features and edges that link the fake user to items. Extensive experiments demonstrate that SUI-Attack can achieve promising attack results in single-user injection. In addition to its attack power, SUI-Attack increases the stealthiness of shilling attack and reduces the risk of being detected. We provide our implementation at: https://github.com/KDEGroup/SUI-Attack.
引用
收藏
页码:864 / 873
页数:10
相关论文
共 50 条
  • [21] Ready for emerging threats to recommender systems? A graph convolution-based generative shilling attack
    Wu, Fan
    Gao, Min
    Yu, Junliang
    Wang, Zongwei
    Liu, Kecheng
    Wang, Xu
    INFORMATION SCIENCES, 2021, 578 : 683 - 701
  • [22] Shilling attack detection for recommender systems based on credibility of group users and rating time series
    Zhou, Wei
    Wen, Junhao
    Qu, Qiang
    Zeng, Jun
    Cheng, Tian
    PLOS ONE, 2018, 13 (05):
  • [23] Prevention of Shilling Attack in Recommender Systems using Discrete Wavelet Transform and Support Vector Machine
    Karthikeyan, P.
    Selvi, Thamarai S.
    Neeraja, G.
    Deepika, R.
    Vincent, A.
    Abinaya, V
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 99 - 104
  • [24] Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours
    Zhang, Fuzhi
    Ling, Zhoujun
    Wang, Shilei
    IET INFORMATION SECURITY, 2019, 13 (03) : 174 - 187
  • [25] Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering
    Zhang, Xiang-Liang
    Lee, Tak Man Desmond
    Pitsilis, Georgios
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (04) : 616 - 624
  • [26] Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering
    Xiang-Liang Zhang
    Tak Man Desmond Lee
    Georgios Pitsilis
    Journal of Computer Science and Technology, 2013, 28 : 616 - 624
  • [27] Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering
    张响亮
    Tak Man Desmond Lee
    Georgios Pitsilis
    Journal of Computer Science & Technology, 2013, 28 (04) : 616 - 624
  • [28] Optimistic Shannon coding theorems for arbitrary single-user systems
    Chen, PN
    Alajaji, F
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (07) : 2623 - 2629
  • [29] A novel classification-based shilling attack detection approach for multi-criteria recommender systems
    Kaya, Tugba Turkoglu
    Yalcin, Emre
    Kaleli, Cihan
    COMPUTATIONAL INTELLIGENCE, 2023, 39 (03) : 499 - 528
  • [30] A Shilling Attack Detection Method Based on SVM and Target Item Analysis in Collaborative Filtering Recommender Systems
    Zhou, Wei
    Wen, Junhao
    Gao, Min
    Liu, Ling
    Cai, Haini
    Wang, Xibin
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2015, 2015, 9403 : 751 - 763