Influence level-based Sybil Attack Resistant Recommender Systems

被引:1
|
作者
Noh, Giseop [1 ]
Oh, Hayoung [2 ]
机构
[1] Seoul Natl Univ, Dept Comp Sci & Engn, Seoul 151744, South Korea
[2] Soongsil Univ, Sch Elect & Engn, Seoul 156743, South Korea
关键词
robust algorithm; recommender systems; link analysis; Sybil attack;
D O I
10.1109/BDCloud.2014.35
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, electronic commerce and online social networks (OSNs) have experienced fast growth, and as a result, recommendation systems (RSs) have become extremely common. Accuracy and robustness are important performance indexes that characterize customized information or suggestions provided by RSs. However, nefarious users may be present, and they can distort information within the RSs by creating fake identities (Sybils). Although prior research has attempted to mitigate the negative impact of Sybils, the presence of these fake identities remains an unsolved problem. In this paper, we introduce a new weighted link analysis and influence level for RSs resistant to Sybil attacks. Our approach is validated through simulations of a broad range of attacks, and it is found to outperform other state-of-the-art recommendation methods in terms of both accuracy and robustness.
引用
收藏
页码:524 / 531
页数:8
相关论文
共 50 条
  • [41] PSD: Practical Sybil detection schemes using stickiness and persistence in online recommender systems
    Noh, Giseop
    Oh, Hayoung
    Kang, Young-myoung
    Kim, Chong-kwon
    INFORMATION SCIENCES, 2014, 281 : 66 - 84
  • [42] Sybil Attack Detection Based on Signal Clustering in Vehicular Networks
    Tulay, Halit Bugra
    Emre Koksal, Can
    IEEE Transactions on Machine Learning in Communications and Networking, 2024, 2 : 753 - 765
  • [43] Sybil Attack Detection in Urban Vanets Based on RSU Support
    Hamed, Hamid
    Keshavarz-Haddad, Alireza
    Haghighi, Shapour Golbahar
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 602 - 606
  • [44] Sybil Attack Detection Based on RSSI for Wireless Sensor Network
    Wang, Jiangtao
    Yang, Geng
    Sun, Yuan
    Chen, Shengshou
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2684 - 2687
  • [45] Sybil Attack Detection Method Based on Geographic Information in ZigBee
    Huang, Mei-gen
    Yu, Bin
    Kong, Zhi-yin
    Zhou, Wei-wei
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 336 - 341
  • [46] Unsupervised Retrieval of Attack Profiles in Collaborative Recommender Systems
    Bryan, Kenneth
    O'Mahony, Michael
    Cunningham, Padraig
    RECSYS'08: PROCEEDINGS OF THE 2008 ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2008, : 155 - 162
  • [47] A Comparative Study of Shilling Attack Detectors for Recommender Systems
    Wang, Youquan
    Zhang, Lu
    Tao, Haicheng
    Wu, Zhiang
    Cao, Jie
    2015 12TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT (ICSSSM), 2015,
  • [48] Collusion-Resistant Sybil Attack Detection Scheme in Mobile Ad hoc Networks
    Khan, Muhammad Sajid
    Iltaf, Naima
    Rashdi, Adnan
    2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 30 - 36
  • [49] Level-Based Analysis of the Univariate Marginal Distribution Algorithm
    Duc-Cuong Dang
    Lehre, Per Kristian
    Phan Trung Hai Nguyen
    ALGORITHMICA, 2019, 81 (02) : 668 - 702
  • [50] SECURITY OBJECT MODELING FOR LEVEL-BASED POLICIES
    PERNUL, G
    DATABASE SECURITY, VIII: STATUS AND PROSPECTS, 1994, 60 : 374 - 374