Detecting abnormal profiles in collaborative filtering recommender systems
Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack...
Gespeichert in:
Veröffentlicht in: | Journal of intelligent information systems 2017-06, Vol.48 (3), p.499-518 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 518 |
---|---|
container_issue | 3 |
container_start_page | 499 |
container_title | Journal of intelligent information systems |
container_volume | 48 |
creator | Yang, Zhihai Cai, Zhongmin |
description | Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack profiles into CFRSs in order to bias the recommendation results to their benefits. To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. However, relying on limited features to improve the detection performance is difficult seemingly, since the existing features can not fully characterize the attack profiles and genuine profiles. In this paper, we propose a novel detection method to make recommender systems resistant to such attacks. The existing features can be briefly summarized as two aspects including rating behavior based and item distribution based. We firstly formulate the problem as finding a mapping model between rating behavior and item distribution by exploiting the least-squares approximate solution. Based on the trained model, we design a detector by employing a regressor to detect such attacks. Extensive experiments on both the MovieLens-100K and MovieLens-ml-latest-small datasets examine the effectiveness of the proposed detection method. Experimental results demonstrate the outperformance of the proposed approach in comparison with benchmarked method including KNN. |
doi_str_mv | 10.1007/s10844-016-0424-5 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1899626423</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1899626423</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-7d0315e5ebd098b1ea28eb3773bcd5c5c6eac49cb17ff78502078c794f2ed1f43</originalsourceid><addsrcrecordid>eNp1kElLBDEQhYMoOC4_wFuD52glnaVzlHFnwIueQ5KuSA-9jEmPMP_ebtqDF08FxXuvXn2EXDG4YQD6NjOohKDAFAXBBZVHZMWkLqlWWh6TFRguqTHAT8lZzlsAMJWCFXm9xxHD2PSfhfP9kDrXFrs0xKbFXDR9EYa2dX5Ibmy-sZjWI6ZZnDAMXYd9janIhzxily_ISXRtxsvfeU4-Hh_e18908_b0sr7b0FAyNVJdQ8kkSvT11MEzdLxCX2pd-lDLIINCF4QJnukYdSWBg66CNiJyrFkU5Tm5XnKnnl97zKPdDvvUTyctq4xRXAleTiq2qEIack4Y7S41nUsHy8DOyOyCzE7I7IzMysnDF0_ezU9i-pP8r-kHYhRvxg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1899626423</pqid></control><display><type>article</type><title>Detecting abnormal profiles in collaborative filtering recommender systems</title><source>SpringerLink Journals - AutoHoldings</source><creator>Yang, Zhihai ; Cai, Zhongmin</creator><creatorcontrib>Yang, Zhihai ; Cai, Zhongmin</creatorcontrib><description>Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack profiles into CFRSs in order to bias the recommendation results to their benefits. To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. However, relying on limited features to improve the detection performance is difficult seemingly, since the existing features can not fully characterize the attack profiles and genuine profiles. In this paper, we propose a novel detection method to make recommender systems resistant to such attacks. The existing features can be briefly summarized as two aspects including rating behavior based and item distribution based. We firstly formulate the problem as finding a mapping model between rating behavior and item distribution by exploiting the least-squares approximate solution. Based on the trained model, we design a detector by employing a regressor to detect such attacks. Extensive experiments on both the MovieLens-100K and MovieLens-ml-latest-small datasets examine the effectiveness of the proposed detection method. Experimental results demonstrate the outperformance of the proposed approach in comparison with benchmarked method including KNN.</description><identifier>ISSN: 0925-9902</identifier><identifier>EISSN: 1573-7675</identifier><identifier>DOI: 10.1007/s10844-016-0424-5</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Artificial Intelligence ; Collaboration ; Computer Science ; Customization ; Data Structures and Information Theory ; Electronic commerce ; Feature extraction ; Filtering systems ; Hackers ; Information Storage and Retrieval ; Intrusion detection systems ; IT in Business ; Mapping ; Natural Language Processing (NLP) ; Recommender systems ; Studies</subject><ispartof>Journal of intelligent information systems, 2017-06, Vol.48 (3), p.499-518</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Journal of Intelligent Information Systems is a copyright of Springer, 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-7d0315e5ebd098b1ea28eb3773bcd5c5c6eac49cb17ff78502078c794f2ed1f43</citedby><cites>FETCH-LOGICAL-c316t-7d0315e5ebd098b1ea28eb3773bcd5c5c6eac49cb17ff78502078c794f2ed1f43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10844-016-0424-5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10844-016-0424-5$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Yang, Zhihai</creatorcontrib><creatorcontrib>Cai, Zhongmin</creatorcontrib><title>Detecting abnormal profiles in collaborative filtering recommender systems</title><title>Journal of intelligent information systems</title><addtitle>J Intell Inf Syst</addtitle><description>Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack profiles into CFRSs in order to bias the recommendation results to their benefits. To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. However, relying on limited features to improve the detection performance is difficult seemingly, since the existing features can not fully characterize the attack profiles and genuine profiles. In this paper, we propose a novel detection method to make recommender systems resistant to such attacks. The existing features can be briefly summarized as two aspects including rating behavior based and item distribution based. We firstly formulate the problem as finding a mapping model between rating behavior and item distribution by exploiting the least-squares approximate solution. Based on the trained model, we design a detector by employing a regressor to detect such attacks. Extensive experiments on both the MovieLens-100K and MovieLens-ml-latest-small datasets examine the effectiveness of the proposed detection method. Experimental results demonstrate the outperformance of the proposed approach in comparison with benchmarked method including KNN.</description><subject>Artificial Intelligence</subject><subject>Collaboration</subject><subject>Computer Science</subject><subject>Customization</subject><subject>Data Structures and Information Theory</subject><subject>Electronic commerce</subject><subject>Feature extraction</subject><subject>Filtering systems</subject><subject>Hackers</subject><subject>Information Storage and Retrieval</subject><subject>Intrusion detection systems</subject><subject>IT in Business</subject><subject>Mapping</subject><subject>Natural Language Processing (NLP)</subject><subject>Recommender systems</subject><subject>Studies</subject><issn>0925-9902</issn><issn>1573-7675</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kElLBDEQhYMoOC4_wFuD52glnaVzlHFnwIueQ5KuSA-9jEmPMP_ebtqDF08FxXuvXn2EXDG4YQD6NjOohKDAFAXBBZVHZMWkLqlWWh6TFRguqTHAT8lZzlsAMJWCFXm9xxHD2PSfhfP9kDrXFrs0xKbFXDR9EYa2dX5Ibmy-sZjWI6ZZnDAMXYd9janIhzxily_ISXRtxsvfeU4-Hh_e18908_b0sr7b0FAyNVJdQ8kkSvT11MEzdLxCX2pd-lDLIINCF4QJnukYdSWBg66CNiJyrFkU5Tm5XnKnnl97zKPdDvvUTyctq4xRXAleTiq2qEIack4Y7S41nUsHy8DOyOyCzE7I7IzMysnDF0_ezU9i-pP8r-kHYhRvxg</recordid><startdate>20170601</startdate><enddate>20170601</enddate><creator>Yang, Zhihai</creator><creator>Cai, Zhongmin</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20170601</creationdate><title>Detecting abnormal profiles in collaborative filtering recommender systems</title><author>Yang, Zhihai ; Cai, Zhongmin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-7d0315e5ebd098b1ea28eb3773bcd5c5c6eac49cb17ff78502078c794f2ed1f43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Artificial Intelligence</topic><topic>Collaboration</topic><topic>Computer Science</topic><topic>Customization</topic><topic>Data Structures and Information Theory</topic><topic>Electronic commerce</topic><topic>Feature extraction</topic><topic>Filtering systems</topic><topic>Hackers</topic><topic>Information Storage and Retrieval</topic><topic>Intrusion detection systems</topic><topic>IT in Business</topic><topic>Mapping</topic><topic>Natural Language Processing (NLP)</topic><topic>Recommender systems</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yang, Zhihai</creatorcontrib><creatorcontrib>Cai, Zhongmin</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Journal of intelligent information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yang, Zhihai</au><au>Cai, Zhongmin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detecting abnormal profiles in collaborative filtering recommender systems</atitle><jtitle>Journal of intelligent information systems</jtitle><stitle>J Intell Inf Syst</stitle><date>2017-06-01</date><risdate>2017</risdate><volume>48</volume><issue>3</issue><spage>499</spage><epage>518</epage><pages>499-518</pages><issn>0925-9902</issn><eissn>1573-7675</eissn><abstract>Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack profiles into CFRSs in order to bias the recommendation results to their benefits. To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. However, relying on limited features to improve the detection performance is difficult seemingly, since the existing features can not fully characterize the attack profiles and genuine profiles. In this paper, we propose a novel detection method to make recommender systems resistant to such attacks. The existing features can be briefly summarized as two aspects including rating behavior based and item distribution based. We firstly formulate the problem as finding a mapping model between rating behavior and item distribution by exploiting the least-squares approximate solution. Based on the trained model, we design a detector by employing a regressor to detect such attacks. Extensive experiments on both the MovieLens-100K and MovieLens-ml-latest-small datasets examine the effectiveness of the proposed detection method. Experimental results demonstrate the outperformance of the proposed approach in comparison with benchmarked method including KNN.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10844-016-0424-5</doi><tpages>20</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0925-9902 |
ispartof | Journal of intelligent information systems, 2017-06, Vol.48 (3), p.499-518 |
issn | 0925-9902 1573-7675 |
language | eng |
recordid | cdi_proquest_journals_1899626423 |
source | SpringerLink Journals - AutoHoldings |
subjects | Artificial Intelligence Collaboration Computer Science Customization Data Structures and Information Theory Electronic commerce Feature extraction Filtering systems Hackers Information Storage and Retrieval Intrusion detection systems IT in Business Mapping Natural Language Processing (NLP) Recommender systems Studies |
title | Detecting abnormal profiles in collaborative filtering recommender systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T16%3A37%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detecting%20abnormal%20profiles%20in%20collaborative%20filtering%20recommender%20systems&rft.jtitle=Journal%20of%20intelligent%20information%20systems&rft.au=Yang,%20Zhihai&rft.date=2017-06-01&rft.volume=48&rft.issue=3&rft.spage=499&rft.epage=518&rft.pages=499-518&rft.issn=0925-9902&rft.eissn=1573-7675&rft_id=info:doi/10.1007/s10844-016-0424-5&rft_dat=%3Cproquest_cross%3E1899626423%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1899626423&rft_id=info:pmid/&rfr_iscdi=true |