Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Re-scale AdaBoost for attack detection in collaborative filtering recommender systems

Published: 15 May 2016 Publication History

Abstract

Collaborative filtering recommender systems (CFRSs) are the key components of successful E-commerce systems. However, CFRSs are highly vulnerable to "shilling" attacks or "profile injection" attacks due to its openness. Since the size of attackers is usually far smaller than genuine users, conventional supervised learning based detection methods could be too "dull" to handle such imbalanced classification. In this paper, we improve detection performance from following two aspects. Firstly, we extract well-designed features from user profiles based on the statistical properties of the diverse attack models, making hard detection scenarios become easier to perform. Then, refer to the general idea of re-scale Boosting (RBoosting) and AdaBoost, we apply a variant of AdaBoost, called the re-scale AdaBoost (RAdaBoost) as our detection method based on the extracted features. Finally, a series of experiments on the MovieLens-100K dataset are conducted to demonstrate the outperformance of RAdaBoost over other competing techniques such as SVM, kNN and AdaBoost.

References

[1]
A. Barron, A. Cohen, W. Dahmen, R. DeVore, Approximation and learning by greedy algorithms, Ann. Stat. 36 (1) (2008) 64-94.
[2]
K. Bryan, M. OMahony, P. Cunningham, Unsupervised retrieval of attack profiles in collaborative recommender systems, in: Proceedings of the ACM Recommender Systems conference (RecSys), 2008, pp. 155-162.
[3]
R. Burke, B. Mobasher, C. Williams, Classification features for attack detection in collaborative recommender systems, in: Proceedings of the International Conference on Knowledge Discovery and Data Mining, 2006, pp. 17-20.
[4]
C.C. Chang, C.J. Lin, LIBSVM: A library for support vector machines, ACM Trans. Intell. Syst. Technol. 2 (2011) 27:1-27:27.
[5]
C. Chung, P. Hsu, S. Huang, A novel approach to filter out malicious rating profiles from recommender systems, J. Decis. Support Syst. 55 (1) (2013) 314-325.
[6]
M.W. David, Evaluation: From precision, recall and f-measure to roc, informedness, markedness correlation, J. Mach. Learn. Technol. 2 (1) (2011) 37-63.
[7]
R. DeVore, V. Temlyakov, Some remarks on greedy algorithms, Adv. Comput. Math. 5 (1) (1996) 173-187.
[8]
J. Ehrlinger, H. Ishwaran, Characterizing l2 boosting, Ann. Stat. 40 (2) (2012) 1074-1101.
[9]
Y. Freund, R.E. Schapire, A decision-theoretic generalization of on-line learning and an application to boosting, J. Comput. Syst. 55 (1) (1997) 119-139.
[10]
Y. Freund, R.E. Schapire, Experiments with a new boosting algorithm, ICML 96 (1996) 148-156.
[11]
J. Friedman, Greedy function approximation: a gradient boosting machine, Ann. Stat. 29 (5) (2001) 1189-1232.
[12]
I. Gunes, C. Kaleli, A. Bilge, H. Polat, Shilling attacks against recommender systems: A comprehensive survey, Artif. Intell. Rev. 42 (4) (2012) 1-33.
[13]
S. Gnnemann, N. Gnnemann, C. Faloutsos, Detecting anomalies in dynamic rating data: A robust probabilistic model for rating evolution, in: Proceedings of the Twentieth ACM SIGKDD Conference on. Knowledge Discovery and Data Mining KDD'2014, 2014, pp. 841-850.
[14]
P. Harrington, Machine Learning in Action, Manning, 2012.
[15]
T. Hastie, R. Tibshirani, J. Friedman, The Elements of Statistical Learning, Springer, New York, 2001.
[16]
T. Hastie, J. Taylor, R. Tibshirani, G. Walther, Forward stagewise regression and the monotone lasso, Electron. J. Stat. 1 (2007) 1-29.
[17]
F. He, X. Wang, B. Liu, Attack detection by rough set theory in recommendation system, in: Proceedings of the IEEE International Conference on Granular Computing, 2010, pp. 692-695.
[18]
C. Li, Z. Luo, Detection of shilling attacks in collaborative filtering recommender systems, in: Proceedings of the International Conference of Soft Computing and Pattern Recognition, 2011, pp. 190-193.
[19]
S.B. Lin, Y. Wang, L. Xu, Re-scale boosting for regression and classification, arXiv: 1505.01371, 2015.
[20]
E.D. Livshits, Lower bounds for the rate of convergence of greedy algorithms, Izv. Math. 73 (6) (2009) 1197-1215.
[21]
B. Mehta, T. Hofmann, P. Fankhauser, Lies and propaganda: detecting spam users in collaborative filtering, in: Proceedings of the Twelfth International Conference on Intelligent User Interfaces, 2007, pp. 14-21.
[22]
B. Mobasher, R. Burke, R. Bhaumik, C. Williams, Effective attack models for shilling item-based effective attack models for shilling item-based, in: Proceedings of the 2005 WebKDD Workshop, WebKDD'05, 2005.
[23]
M. Morid, M. Shajari, Defending recommender systems by influence analysis, Inf. Retr. 17 (2) (2014) 137-152.
[24]
C.E. Seminario, D.C. Wilson, Assessing impacts of a power user attack on a matrix factorization collaborative recommender system, in: Proceedings of the Florida Artificial Intelligence Research Society Conference, 2014.
[25]
C.E. Seminario, D.C. Wilson., Attacking item-based recommender systems with power items, in: Proceedings of the ACM Conference on Recommender Systems, 2014, pp. 57-64.
[26]
V. Temlyakov, Greedy approximation, Acta Numer. 17 (2008) 235-409.
[27]
C.A. Williams, B. Mobasher, R. Burke, Defending recommender systems: detection of profile injection attacks, SOCA 1 (3) (2007) 157-170.
[28]
C.A. Williams, B. Mobasher, R. Burke, R. Bhaumik, Detecting profile injection attacks in collaborative filtering: a classification-based approach, in: Advances in Web Mining and Web Usage Analysis, 2007, pp. 167-186.
[29]
Z.A. Wu, Y.Q. Wang, J. Cao, A survey on shilling attack models and detection techniques for recommender systems, Sci. China 59 (7) (2014) 551-560.
[30]
Z.A. Wu, J.J. Wu, J. Cao, D.C. Tao, Hysad: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation, in: Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2012, pp. 985-993.
[31]
L. Xu, S.B. Lin, Y. Wang, Z.B. Xu, Shrinkage degree in l2-re-scale boosting for regression. arXiv: 1505.04369, 2015.
[32]
F. Zhang, Q. Zhou, A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems, J. Comput. 7 (1) (2012) 226-234.
[33]
F. Zhang, Q. Zhou, HHT-SVM: An online method for detecting profile injection attacks in collaborative recommender systems, Knowl. Based Syst. 65 (2014) 96-105.
[34]
T. Zhang, B. Yu, Boosting with early stopping: convergence and consistency, Ann. Stat. 33 (4) (2005) 1538-1579.
[35]
Z. Zhang, S. Kulkarni, Graph-based detection of shilling attacks in recommender systems, in: Proceedings of the IEEE International Workshop on Machine Learning for Signal Processing, 2013, pp. 1-6.
[36]
Z. Zhang, S.R. Kulkarni, Detection of shilling attacks in recommender systems via spectral clustering, in: Proceedings of the International Conference on Information Fusion, 2014, pp. 1-8.
[37]
Z. Zhang, H. Lin, K. Liu, D. Wu, G. Zhang, J. Lu, A hybrid fuzzy-based personalized recommender system for telecom products/services, Inf. Sci. 235 (2013) 117-129.
[38]
Z.D. Zhao, M.S. Shang, User-based collaborative-filtering recommendation algorithms on hadoop, in: Third International Conference on Knowl. Discov. Data Min., WKDD'10, 2010, pp. 478-481.

Cited By

View all
  • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/367732857:1(1-39)Online publication date: 7-Oct-2024
  • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/3652891Online publication date: 13-Apr-2024
  • (2024)Improving the Shortest Plank: Vulnerability-Aware Adversarial Training for Robust Recommender SystemProceedings of the 18th ACM Conference on Recommender Systems10.1145/3640457.3688120(680-689)Online publication date: 8-Oct-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Knowledge-Based Systems
Knowledge-Based Systems  Volume 100, Issue C
May 2016
212 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 15 May 2016

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/367732857:1(1-39)Online publication date: 7-Oct-2024
  • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/3652891Online publication date: 13-Apr-2024
  • (2024)Improving the Shortest Plank: Vulnerability-Aware Adversarial Training for Robust Recommender SystemProceedings of the 18th ACM Conference on Recommender Systems10.1145/3640457.3688120(680-689)Online publication date: 8-Oct-2024
  • (2024)LoRec: Combating Poisons with Large Language Model for Robust Sequential RecommendationProceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3626772.3657684(1733-1742)Online publication date: 10-Jul-2024
  • (2023)RETRACTED ARTICLE: Support attack detection algorithm for recommendation system based on deep learningEURASIP Journal on Wireless Communications and Networking10.1186/s13638-023-02269-w2023:1Online publication date: 20-Jul-2023
  • (2023)Secure and Enhanced Online Recommendations: A Federated Intelligence ApproachIEEE Transactions on Consumer Electronics10.1109/TCE.2023.333515670:1(2500-2507)Online publication date: 28-Nov-2023
  • (2023)Sampling and noise filtering methods for recommender systemsEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.106129122:COnline publication date: 1-Jun-2023
  • (2023)Securing recommender system via cooperative trainingWorld Wide Web10.1007/s11280-023-01214-726:6(3915-3943)Online publication date: 1-Nov-2023
  • (2022)Incorporating textual reviews in the learning of latent factors for recommender systemsElectronic Commerce Research and Applications10.1016/j.elerap.2022.10113352:COnline publication date: 1-Mar-2022
  • (2022)Rating behavior evaluation and abnormality forensics analysis for injection attack detectionJournal of Intelligent Information Systems10.1007/s10844-021-00689-y59:1(93-119)Online publication date: 1-Aug-2022
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media