Detecting abnormal profiles in collaborative filtering recommender systems

Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of intelligent information systems 2017-06, Vol.48 (3), p.499-518
Hauptverfasser: Yang, Zhihai, Cai, Zhongmin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 518
container_issue 3
container_start_page 499
container_title Journal of intelligent information systems
container_volume 48
creator Yang, Zhihai
Cai, Zhongmin
description Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack profiles into CFRSs in order to bias the recommendation results to their benefits. To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. However, relying on limited features to improve the detection performance is difficult seemingly, since the existing features can not fully characterize the attack profiles and genuine profiles. In this paper, we propose a novel detection method to make recommender systems resistant to such attacks. The existing features can be briefly summarized as two aspects including rating behavior based and item distribution based. We firstly formulate the problem as finding a mapping model between rating behavior and item distribution by exploiting the least-squares approximate solution. Based on the trained model, we design a detector by employing a regressor to detect such attacks. Extensive experiments on both the MovieLens-100K and MovieLens-ml-latest-small datasets examine the effectiveness of the proposed detection method. Experimental results demonstrate the outperformance of the proposed approach in comparison with benchmarked method including KNN.
doi_str_mv 10.1007/s10844-016-0424-5
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1899626423</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1899626423</sourcerecordid><originalsourceid>FETCH-LOGICAL-c316t-7d0315e5ebd098b1ea28eb3773bcd5c5c6eac49cb17ff78502078c794f2ed1f43</originalsourceid><addsrcrecordid>eNp1kElLBDEQhYMoOC4_wFuD52glnaVzlHFnwIueQ5KuSA-9jEmPMP_ebtqDF08FxXuvXn2EXDG4YQD6NjOohKDAFAXBBZVHZMWkLqlWWh6TFRguqTHAT8lZzlsAMJWCFXm9xxHD2PSfhfP9kDrXFrs0xKbFXDR9EYa2dX5Ibmy-sZjWI6ZZnDAMXYd9janIhzxily_ISXRtxsvfeU4-Hh_e18908_b0sr7b0FAyNVJdQ8kkSvT11MEzdLxCX2pd-lDLIINCF4QJnukYdSWBg66CNiJyrFkU5Tm5XnKnnl97zKPdDvvUTyctq4xRXAleTiq2qEIack4Y7S41nUsHy8DOyOyCzE7I7IzMysnDF0_ezU9i-pP8r-kHYhRvxg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1899626423</pqid></control><display><type>article</type><title>Detecting abnormal profiles in collaborative filtering recommender systems</title><source>SpringerLink Journals - AutoHoldings</source><creator>Yang, Zhihai ; Cai, Zhongmin</creator><creatorcontrib>Yang, Zhihai ; Cai, Zhongmin</creatorcontrib><description>Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack profiles into CFRSs in order to bias the recommendation results to their benefits. To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. However, relying on limited features to improve the detection performance is difficult seemingly, since the existing features can not fully characterize the attack profiles and genuine profiles. In this paper, we propose a novel detection method to make recommender systems resistant to such attacks. The existing features can be briefly summarized as two aspects including rating behavior based and item distribution based. We firstly formulate the problem as finding a mapping model between rating behavior and item distribution by exploiting the least-squares approximate solution. Based on the trained model, we design a detector by employing a regressor to detect such attacks. Extensive experiments on both the MovieLens-100K and MovieLens-ml-latest-small datasets examine the effectiveness of the proposed detection method. Experimental results demonstrate the outperformance of the proposed approach in comparison with benchmarked method including KNN.</description><identifier>ISSN: 0925-9902</identifier><identifier>EISSN: 1573-7675</identifier><identifier>DOI: 10.1007/s10844-016-0424-5</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Artificial Intelligence ; Collaboration ; Computer Science ; Customization ; Data Structures and Information Theory ; Electronic commerce ; Feature extraction ; Filtering systems ; Hackers ; Information Storage and Retrieval ; Intrusion detection systems ; IT in Business ; Mapping ; Natural Language Processing (NLP) ; Recommender systems ; Studies</subject><ispartof>Journal of intelligent information systems, 2017-06, Vol.48 (3), p.499-518</ispartof><rights>Springer Science+Business Media New York 2016</rights><rights>Journal of Intelligent Information Systems is a copyright of Springer, 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c316t-7d0315e5ebd098b1ea28eb3773bcd5c5c6eac49cb17ff78502078c794f2ed1f43</citedby><cites>FETCH-LOGICAL-c316t-7d0315e5ebd098b1ea28eb3773bcd5c5c6eac49cb17ff78502078c794f2ed1f43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10844-016-0424-5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s10844-016-0424-5$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Yang, Zhihai</creatorcontrib><creatorcontrib>Cai, Zhongmin</creatorcontrib><title>Detecting abnormal profiles in collaborative filtering recommender systems</title><title>Journal of intelligent information systems</title><addtitle>J Intell Inf Syst</addtitle><description>Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack profiles into CFRSs in order to bias the recommendation results to their benefits. To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. However, relying on limited features to improve the detection performance is difficult seemingly, since the existing features can not fully characterize the attack profiles and genuine profiles. In this paper, we propose a novel detection method to make recommender systems resistant to such attacks. The existing features can be briefly summarized as two aspects including rating behavior based and item distribution based. We firstly formulate the problem as finding a mapping model between rating behavior and item distribution by exploiting the least-squares approximate solution. Based on the trained model, we design a detector by employing a regressor to detect such attacks. Extensive experiments on both the MovieLens-100K and MovieLens-ml-latest-small datasets examine the effectiveness of the proposed detection method. Experimental results demonstrate the outperformance of the proposed approach in comparison with benchmarked method including KNN.</description><subject>Artificial Intelligence</subject><subject>Collaboration</subject><subject>Computer Science</subject><subject>Customization</subject><subject>Data Structures and Information Theory</subject><subject>Electronic commerce</subject><subject>Feature extraction</subject><subject>Filtering systems</subject><subject>Hackers</subject><subject>Information Storage and Retrieval</subject><subject>Intrusion detection systems</subject><subject>IT in Business</subject><subject>Mapping</subject><subject>Natural Language Processing (NLP)</subject><subject>Recommender systems</subject><subject>Studies</subject><issn>0925-9902</issn><issn>1573-7675</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kElLBDEQhYMoOC4_wFuD52glnaVzlHFnwIueQ5KuSA-9jEmPMP_ebtqDF08FxXuvXn2EXDG4YQD6NjOohKDAFAXBBZVHZMWkLqlWWh6TFRguqTHAT8lZzlsAMJWCFXm9xxHD2PSfhfP9kDrXFrs0xKbFXDR9EYa2dX5Ibmy-sZjWI6ZZnDAMXYd9janIhzxily_ISXRtxsvfeU4-Hh_e18908_b0sr7b0FAyNVJdQ8kkSvT11MEzdLxCX2pd-lDLIINCF4QJnukYdSWBg66CNiJyrFkU5Tm5XnKnnl97zKPdDvvUTyctq4xRXAleTiq2qEIack4Y7S41nUsHy8DOyOyCzE7I7IzMysnDF0_ezU9i-pP8r-kHYhRvxg</recordid><startdate>20170601</startdate><enddate>20170601</enddate><creator>Yang, Zhihai</creator><creator>Cai, Zhongmin</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope></search><sort><creationdate>20170601</creationdate><title>Detecting abnormal profiles in collaborative filtering recommender systems</title><author>Yang, Zhihai ; Cai, Zhongmin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c316t-7d0315e5ebd098b1ea28eb3773bcd5c5c6eac49cb17ff78502078c794f2ed1f43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Artificial Intelligence</topic><topic>Collaboration</topic><topic>Computer Science</topic><topic>Customization</topic><topic>Data Structures and Information Theory</topic><topic>Electronic commerce</topic><topic>Feature extraction</topic><topic>Filtering systems</topic><topic>Hackers</topic><topic>Information Storage and Retrieval</topic><topic>Intrusion detection systems</topic><topic>IT in Business</topic><topic>Mapping</topic><topic>Natural Language Processing (NLP)</topic><topic>Recommender systems</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yang, Zhihai</creatorcontrib><creatorcontrib>Cai, Zhongmin</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Access via ABI/INFORM (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Journal of intelligent information systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yang, Zhihai</au><au>Cai, Zhongmin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detecting abnormal profiles in collaborative filtering recommender systems</atitle><jtitle>Journal of intelligent information systems</jtitle><stitle>J Intell Inf Syst</stitle><date>2017-06-01</date><risdate>2017</risdate><volume>48</volume><issue>3</issue><spage>499</spage><epage>518</epage><pages>499-518</pages><issn>0925-9902</issn><eissn>1573-7675</eissn><abstract>Personalization collaborative filtering recommender systems (CFRSs) are the crucial components of popular E-commerce services. In practice, CFRSs are also particularly vulnerable to “shilling” attacks or “profile injection” attacks due to their openness. The attackers can inject well-designed attack profiles into CFRSs in order to bias the recommendation results to their benefits. To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. However, relying on limited features to improve the detection performance is difficult seemingly, since the existing features can not fully characterize the attack profiles and genuine profiles. In this paper, we propose a novel detection method to make recommender systems resistant to such attacks. The existing features can be briefly summarized as two aspects including rating behavior based and item distribution based. We firstly formulate the problem as finding a mapping model between rating behavior and item distribution by exploiting the least-squares approximate solution. Based on the trained model, we design a detector by employing a regressor to detect such attacks. Extensive experiments on both the MovieLens-100K and MovieLens-ml-latest-small datasets examine the effectiveness of the proposed detection method. Experimental results demonstrate the outperformance of the proposed approach in comparison with benchmarked method including KNN.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10844-016-0424-5</doi><tpages>20</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0925-9902
ispartof Journal of intelligent information systems, 2017-06, Vol.48 (3), p.499-518
issn 0925-9902
1573-7675
language eng
recordid cdi_proquest_journals_1899626423
source SpringerLink Journals - AutoHoldings
subjects Artificial Intelligence
Collaboration
Computer Science
Customization
Data Structures and Information Theory
Electronic commerce
Feature extraction
Filtering systems
Hackers
Information Storage and Retrieval
Intrusion detection systems
IT in Business
Mapping
Natural Language Processing (NLP)
Recommender systems
Studies
title Detecting abnormal profiles in collaborative filtering recommender systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T16%3A37%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detecting%20abnormal%20profiles%20in%20collaborative%20filtering%20recommender%20systems&rft.jtitle=Journal%20of%20intelligent%20information%20systems&rft.au=Yang,%20Zhihai&rft.date=2017-06-01&rft.volume=48&rft.issue=3&rft.spage=499&rft.epage=518&rft.pages=499-518&rft.issn=0925-9902&rft.eissn=1573-7675&rft_id=info:doi/10.1007/s10844-016-0424-5&rft_dat=%3Cproquest_cross%3E1899626423%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1899626423&rft_id=info:pmid/&rfr_iscdi=true