Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3298689.3347050acmotherconferencesArticle/Chapter ViewAbstractPublication PagesrecsysConference Proceedingsconference-collections
short-paper

Quick and accurate attack detection in recommender systems through user attributes

Published: 10 September 2019 Publication History

Abstract

Malicious profiles have been a credible threat to collaborative recommender systems. Attackers provide fake item ratings to systematically manipulate the platform. Attack detection algorithms can identify and remove such users by observing rating distributions. In this study, we aim to use the user attributes as an additional information source to improve the accuracy and speed of attack detection. We propose a probabilistic factorization model which can embed mixed data type user attributes and observed ratings into a latent space to generate anomaly statistics for new users. To identify the persistent outliers in the system, we also propose a sequential attack detection algorithm to enable quick and accurate detection based on the probabilistic model learned from genuine users. The proposed model demonstrates significant improvements in both accuracy and speed when compared to baseline algorithms on a popular benchmark dataset.

References

[1]
Charu C Aggarwal. 2016. Recommender Systems: The Textbook. Springer.
[2]
Michèle Basseville, Igor V Nikiforov, et al. 1993. Detection of abrupt changes: theory and application. Vol. 104. Prentice Hall Englewood Cliffs.
[3]
Runa Bhaumik, Bamshad Mobasher, and Robin Burke. 2011. A clustering approach to unsupervised attack detection in collaborative recommender systems. In Proceedings of the International Conference on Data Mining (DMIN). Citeseer, 181--187.
[4]
Runa Bhaumik, Chad Williams, Bamshad Mobasher, and Robin Burke. 2006. Securing collaborative filtering against malicious attacks through anomaly detection. In Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization (ITWP06), Boston, Vol. 6. 10.
[5]
Alper Bilge, Zeynep Ozdemir, and Huseyin Polat. 2014. A novel shilling attack detection method. Procedia Computer Science 31 (2014), 165--174.
[6]
Dankmar Böhning. 1992. Multinomial logistic regression algorithm. Annals of the institute of Statistical Mathematics 44, 1 (1992), 197--200.
[7]
Kenneth Bryan, Michael O'Mahony, and Pádraig Cunningham. 2008. Unsupervised retrieval of attack profiles in collaborative recommender systems. In Proceedings of the 2008 ACM conference on Recommender systems. ACM, 155--162.
[8]
Robin Burke, Bamshad Mobasher, Chad Williams, and Runa Bhaumik. 2006. Classification features for attack detection in collaborative recommender systems. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 542--547.
[9]
Paul-Alexandru Chirita, Wolfgang Nejdl, and Cristian Zamfir. 2005. Preventing shilling attacks in online recommender systems. In Proceedings of the 7th annual ACM international workshop on Web information and data management. ACM, 67--74.
[10]
Zoubin Ghahramani, Geoffrey E Hinton, et al. 1996. The EM algorithm for mixtures of factor analyzers. Technical Report CRG-TR-96-1.
[11]
Neil Hurley, Zunping Cheng, and Mi Zhang. 2009. Statistical attack detection. In Proceedings of the third ACM conference on Recommender systems. ACM, 149--156.
[12]
Mohammad E Khan, Guillaume Bouchard, Kevin P Murphy, and Benjamin M Marlin. 2010. Variational bounds for mixed-data factor analysis. In Advances in Neural Information Processing Systems. 1108--1116.
[13]
Jong-Seok Lee and Dan Zhu. 2012. Shilling attack detection-A new approach for a trustworthy recommender system. INFORMS Journal on Computing 24, 1 (2012), 117--131.
[14]
Cong Li and Zhigang Luo. 2011. Detection of shilling attacks in collaborative filtering recommender systems. In 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR). IEEE, 190--193.
[15]
Shang Li and Xiaodong Wang. 2014. Quickest attack detection in multi-agent reputation systems. IEEE Journal of Selected Topics in Signal Processing 8, 4 (2014), 653--666.
[16]
Yuhong Liu and Yan Sun. 2010. Anomaly detection in feedback-based reputation systems through temporal and correlation analysis. In 2010 IEEE Second International Conference on Social Computing. IEEE, 65--72.
[17]
Bhaskar Mehta and Wolfgang Nejdl. 2009. Unsupervised strategies for shilling detection and robust collaborative filtering. User Modeling and User-Adapted Interaction 19, 1-2 (2009), 65--97.
[18]
Kevin P Murphy. 2012. Machine learning: a probabilistic perspective.
[19]
Michael P O'mahony, Neil J Hurley, and Guenole CM Silvestre. 2004. An evaluation of neighbourhood formation on the performance of collaborative filtering. Artificial Intelligence Review 21, 3-4 (2004), 215--228.
[20]
Francesco Ricci, Lior Rokach, and Bracha Shapira. 2015. Recommender Systems Handbook. Springer.
[21]
Ronald L Wasserstein, Nicole A Lazar, et al. 2016. The ASAâÄŹs statement on p-values: context, process, and purpose. The American Statistician 70, 2 (2016), 129--133.
[22]
Zhihai Yang, Zhongmin Cai, and Xiaohong Guan. 2016. Estimating user behavior toward detecting anomalous ratings in rating systems. Knowledge-Based Systems 111 (2016), 144--158.
[23]
Fuzhi Zhang, Zening Zhang, Peng Zhang, and Shilei Wang. 2018. UD-HMM: An unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering. Knowledge-Based Systems 148 (2018), 146--166.
[24]
Zhuo Zhang and Sanjeev R Kulkarni. 2013. Graph-based detection of shilling attacks in recommender systems. In 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP). IEEE, 1--6.
[25]
Zhuo Zhang and Sanjeev R Kulkarni. 2014. Detection of shilling attacks in recommender systems via spectral clustering. In 17th International Conference on Information Fusion (FUSION). IEEE, 1--8.

Cited By

View all
  • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/3677328Online publication date: 25-Jul-2024
  • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/3652891Online publication date: 13-Apr-2024
  • (2024)Secure and Enhanced Online Recommendations: A Federated Intelligence ApproachIEEE Transactions on Consumer Electronics10.1109/TCE.2023.333515670:1(2500-2507)Online publication date: Feb-2024
  • Show More Cited By

Index Terms

  1. Quick and accurate attack detection in recommender systems through user attributes

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    RecSys '19: Proceedings of the 13th ACM Conference on Recommender Systems
    September 2019
    635 pages
    ISBN:9781450362436
    DOI:10.1145/3298689
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 September 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. attribute embedding
    2. probabilistic matrix factorization
    3. sequential attack detection

    Qualifiers

    • Short-paper

    Conference

    RecSys '19
    RecSys '19: Thirteenth ACM Conference on Recommender Systems
    September 16 - 20, 2019
    Copenhagen, Denmark

    Acceptance Rates

    RecSys '19 Paper Acceptance Rate 36 of 189 submissions, 19%;
    Overall Acceptance Rate 254 of 1,295 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)32
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 21 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/3677328Online publication date: 25-Jul-2024
    • (2024)A Survey on Trustworthy Recommender SystemsACM Transactions on Recommender Systems10.1145/3652891Online publication date: 13-Apr-2024
    • (2024)Secure and Enhanced Online Recommendations: A Federated Intelligence ApproachIEEE Transactions on Consumer Electronics10.1109/TCE.2023.333515670:1(2500-2507)Online publication date: Feb-2024
    • (2023)RecAD: Towards A Unified Library for Recommender Attack and DefenseProceedings of the 17th ACM Conference on Recommender Systems10.1145/3604915.3609490(234-244)Online publication date: 14-Sep-2023
    • (2023)Poisoning GNN-based Recommender Systems with Generative Surrogate-based AttacksACM Transactions on Information Systems10.1145/356742041:3(1-24)Online publication date: 7-Feb-2023
    • (2023)Influence-Driven Data Poisoning for Robust Recommender SystemsIEEE Transactions on Pattern Analysis and Machine Intelligence10.1109/TPAMI.2023.3274759(1-17)Online publication date: 2023
    • (2023)Enhancing the Transferability of Adversarial Examples Based on Nesterov Momentum for Recommendation SystemsIEEE Transactions on Big Data10.1109/TBDATA.2023.32486269:5(1276-1287)Online publication date: Oct-2023
    • (2023)Experimental and Theoretical Study for the Popular Shilling Attacks Detection Methods in Collaborative Recommender SystemIEEE Access10.1109/ACCESS.2023.328940411(79358-79369)Online publication date: 2023
    • (2021)Triple Adversarial Learning for Influence based Poisoning Attack in Recommender SystemsProceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining10.1145/3447548.3467335(1830-1840)Online publication date: 14-Aug-2021
    • (2021)Fight Fire with Fire: Towards Robust Recommender Systems via Adversarial Poisoning TrainingProceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3404835.3462914(1074-1083)Online publication date: 11-Jul-2021
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media