Detecting shilling attacks in social recommender systems based on time series analysis and trust features

被引:27
|
作者
Xu, Yishu [1 ,2 ,3 ,4 ]
Zhang, Fuzhi [1 ,2 ,3 ]
机构
[1] Yanshan Univ, Sch Informat Sci & Engn, Qinhuangdao, Hebei, Peoples R China
[2] Key Lab Comp Virtual Technol & Syst Integrat Hebe, Qinhuangdao, Hebei, Peoples R China
[3] Key Lab Software Engn Hebei Prov, Qinhuangdao, Hebei, Peoples R China
[4] Beijing Univ Posts & Telecommun, Century Coll, Sch Comp Sci & Technol Dept, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Social recommender systems; Shilling attacks; Shilling attack detection; Time series analysis; Trust features; MODEL;
D O I
10.1016/j.knosys.2019.04.012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In social recommender systems or trust-based recommender systems, malicious users can bias the recommendations by injecting a large number of fake profiles and by building bogus trust relationships. The existing shilling attack detection methods suffer from low precision when detecting attacks in social recommender systems because they focus mainly on the rating pattern differences between attack profiles and genuine ones and ignore the trust relationships between users. In this paper, we propose an approach for detecting shilling attacks in social recommender systems based on time series analysis and trust features (TSA-TF). Firstly, we construct rating distribution time series for items and propose a dynamic rating distribution prediction model to detect suspicious items by using a single exponential smoothing method. Then, we filter out a part of genuine user profiles by analyzing suspicious items and obtain the set of suspicious user profiles. Secondly, we propose four features by combining rating patterns and trust relationships and train a support vector machine (SVM) classifier to discriminate attack profiles in the set of suspicious user profiles. Experiments on the CiaoDVD dataset and Epinions dataset show that the proposed approach can improve the detection precision while maintaining a high recall. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:25 / 47
页数:23
相关论文
共 50 条
  • [1] Detection of Trust Shilling Attacks in Recommender Systems
    Chen, Xian
    Deng, Xi
    Huang, Chensen
    Shin, Hyoseop
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (06): : 1239 - 1242
  • [2] Detection of Trust Shilling Attacks in Recommender Systems
    Chen X.
    Deng X.
    Huang C.
    Shin H.
    IEICE Transactions on Information and Systems, 2022, E105D (06) : 1239 - 1242
  • [3] Detecting shilling attacks in recommender systems based on analysis of user rating behavior
    Cai, Hongyun
    Zhang, Fuzhi
    KNOWLEDGE-BASED SYSTEMS, 2019, 177 : 22 - 43
  • [4] An unsupervised algorithm for detecting shilling attacks on recommender systems
    Li C.
    Luo Z.-G.
    Shi J.-L.
    Zidonghua Xuebao/Acta Automatica Sinica, 2011, 37 (02): : 160 - 167
  • [5] Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis
    Xu, Yishu
    Zhang, Peng
    Yu, Hongtao
    Zhang, Fuzhi
    COMPUTER JOURNAL, 2024, 67 (02): : 604 - 616
  • [6] A genre trust model for defending shilling attacks in recommender systems
    Li Yang
    Xinxin Niu
    Complex & Intelligent Systems, 2023, 9 : 2929 - 2942
  • [7] A genre trust model for defending shilling attacks in recommender systems
    Yang, Li
    Niu, Xinxin
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (03) : 2929 - 2942
  • [8] An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features
    Cai, Hongyun
    Zhang, Fuzhi
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems
    Hao, Yaojun
    Zhang, Peng
    Zhang, Fuzhi
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [10] Detecting shilling attacks in recommender systems based on non-random-missing mechanism
    School of Computer, National University of Defense Technology, Changsha 410073, China
    Li, C. (licongwhy@gmail.com), 1681, Science Press (39):