Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1639714.1639740acmconferencesArticle/Chapter ViewAbstractPublication PagesrecsysConference Proceedingsconference-collections
research-article

Statistical attack detection

Published: 23 October 2009 Publication History

Abstract

It has been shown in recent years that effective profile injection or shilling attacks can be mounted on standard recommendation algorithms. These attacks consist of the insertion of bogus user profiles into the system database in order to manipulate the recommendation output, for example to promote or demote the predicted ratings for a particular product. A number of attack models have been proposed and some detection strategies to identify these attacks have been empirically evaluated. In this paper we show that the standard attack models can be readily detected using statistical detection techniques. We argue that insufficient consideration of the effectiveness of attacks under a constraint of statistical invariance has been taken in past research. In fact, it is possible to create effective attacks that are undetectable using the detection strategies proposed to date, including the PCA-based clustering strategy which has shown excellent performance against standard attacks. Nevertheless, these more advanced attacks can also be detected with careful design of a statistical detector. The question posed for future research is whether attack models that produce effective attack profiles that are statistically identical to genuine profiles are really possible.

References

[1]
C. A.Williams, B. Mobasher, and R. Burke. Defending recommender systems: detection of profile injection attacks. Service Oriented Computing and Applications, pages 157--170, 2007.
[2]
K. Bryan, M. O'Mahony, and P. Cunningham. Unsupervised retrieval of attack profiles in collaborative recommender systems. In RecSys '08: Proceedings of the 2008 ACM conference on Recommender systems, pages 155--162, New York, NY, USA, 2008. ACM.
[3]
R. Burke, B. Mobasher, and C. Williams. Classification features for attack detection in collaborative recommender systems. In Proceedings of the 12th International Conference on Knowledge Discovery and Data Mining, pages 17--20, 2006.
[4]
J. Canny. Collaborative filtering with privacy via factor analysis. In Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pages 238--245, August 11--15 2002.
[5]
P. A. Chirita, W. Nejdl, and C. Zamfir. Preventing shilling attacks in online recommender systems. In Proceedings of the ACM Workshop on Web Information and Data Management (WIDM'2005), pages 67--74, November 5 2005.
[6]
C. Dellarocas. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the 2nd ACM Conference on Electronic Commerce (EC'00), pages 150--157, October 17--20 2000.
[7]
G. Karypis and V. Kumar. Modularity and community structure in networks. Journal of Parallel and Distributed Computing, 48(1):96--129, 1998.
[8]
S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In Proceedings of the 13th International World Wide Web Conference, pages 393--402, May 17--20 2004.
[9]
B. Mehta, T. Hofmann, and P. Fankhauser. Lies and propaganda: Detecting spam users in collaborative filtering. In Proceedings of the 12th international conference on Intelligent user interfaces, pages 14--21, 2007.
[10]
B. Mehta and W. Nejdl. Unsupervised strategies for shilling detection and robust collaborative filtering. User Modeling and User-Adapted Interaction, 19(1-2):65--97, 2009.
[11]
B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 7(4), 2007.
[12]
B. Mobasher, R. D. Burke, and J. J. Sandvig. Model-based collaborative filtering as a defense against profile injection attacks. In AAAI. AAAI Press, 2006.
[13]
M. P. O'Mahony, N. J. Hurley, and C. C. M. Silvestre. An evaluation of neighbourhood formation on the performance of collaborative filtering. Artificial Intelligence Review, 21(1):215--228, March 2004.
[14]
M. P. O'Mahony, N. J. Hurley, and G. C. M. Silvestre. Promoting recommendations: An attack on collaborative filtering. In A. Hameurlain, R. Cicchetti, and R. Traunm¨uller, editors, DEXA, volume 2453 of Lecture Notes in Computer Science, pages 494--503. Springer, 2002.
[15]
P. Resnick and R. Sami. The influence limiter: provably manipulation-resistant recommender systems. In RecSys '07: Proceedings of the 2007 ACM conference on Recommender systems, pages 25--32, New York, NY, USA, 2007. ACM.
[16]
C. Williams, B. Mobasher, R. Burke, R. Bhaumik, and J. Sandvig. Detection of obfuscated attacks in collaborative recommender systems. In Proceedings of the 17th European Conference on Artificial Intelligence (ECAI'06), August 2006.

Cited By

View all
  • (2024)Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNGSymmetry10.3390/sym1605059316:5(593)Online publication date: 10-May-2024
  • (2024)Detecting the adversarially-learned injection attacks via knowledge graphsInformation Systems10.1016/j.is.2024.102419125(102419)Online publication date: Nov-2024
  • (2024)Detection of Shilling Attack with Support Vector Machines Using OversamplingScience, Engineering Management and Information Technology10.1007/978-3-031-72287-5_13(215-230)Online publication date: 12-Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
RecSys '09: Proceedings of the third ACM conference on Recommender systems
October 2009
442 pages
ISBN:9781605584355
DOI:10.1145/1639714
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 October 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. collaborative filtering
  2. detection
  3. recommender systems
  4. robustness

Qualifiers

  • Research-article

Conference

RecSys '09
Sponsor:
RecSys '09: Third ACM Conference on Recommender Systems
October 23 - 25, 2009
New York, New York, USA

Acceptance Rates

Overall Acceptance Rate 254 of 1,295 submissions, 20%

Upcoming Conference

RecSys '24
18th ACM Conference on Recommender Systems
October 14 - 18, 2024
Bari , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)7
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNGSymmetry10.3390/sym1605059316:5(593)Online publication date: 10-May-2024
  • (2024)Detecting the adversarially-learned injection attacks via knowledge graphsInformation Systems10.1016/j.is.2024.102419125(102419)Online publication date: Nov-2024
  • (2024)Detection of Shilling Attack with Support Vector Machines Using OversamplingScience, Engineering Management and Information Technology10.1007/978-3-031-72287-5_13(215-230)Online publication date: 12-Sep-2024
  • (2023)KC-GCNWireless Communications & Mobile Computing10.1155/2023/28548742023Online publication date: 16-Feb-2023
  • (2023)A Survey on Threat Hunting in Enterprise NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2023.329951925:4(2299-2324)Online publication date: Dec-2024
  • (2023)Experimental and Theoretical Study for the Popular Shilling Attacks Detection Methods in Collaborative Recommender SystemIEEE Access10.1109/ACCESS.2023.328940411(79358-79369)Online publication date: 2023
  • (2023)The EEG signals encryption algorithm with K-sine-transform-based coupling chaotic systemInformation Sciences10.1016/j.ins.2022.12.001622(962-984)Online publication date: Apr-2023
  • (2022)A Malicious Program Attack Identification Model Based on Risk Dependency AnalysisProceedings of the 2022 5th International Conference on Machine Learning and Machine Intelligence10.1145/3568199.3568227(175-182)Online publication date: 23-Sep-2022
  • (2022)Gray-Box Shilling Attack: An Adversarial Learning ApproachACM Transactions on Intelligent Systems and Technology10.1145/351235213:5(1-21)Online publication date: 14-Oct-2022
  • (2022)Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack DetectionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.314676917(531-546)Online publication date: 2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media