Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1150402.1150508acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article

Attack detection in time series for recommender systems

Published: 20 August 2006 Publication History

Abstract

Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recommendations, have been shown to be effective against collaborative filtering algorithms. We postulate that the distribution of item ratings in time can reveal the presence of a wide range of shilling attacks given reasonable assumptions about their duration. To construct a time series of ratings for an item, we use a window size of k to group consecutive ratings for the item into disjoint windows and compute the sample average and sample entropy in each window. We derive a theoretically optimal window size to best detect an attack event if the number of attack profiles is known. For practical applications where this number is unknown, we propose a heuristic algorithm that adaptively changes the window size. Our experimental results demonstrate that monitoring rating distributions in time series is an effective approach for detecting shilling attacks.

References

[1]
A. Antos and I. Kontoyiannis. Convergence properties of functional estimates for discrete distributions. Random Structures and Algorithms, 19(3-4):163--193, 2001.
[2]
G. Basarin. On a statistical estimate for the entropy of a sequence of independent random variables. Theory of Probability and Its Applications, 4(3):333--336, 1959.
[3]
P. J. Brockwell and R. A. Davis. Introduction to Time Series and Forecasting. Springer, 2nd edition, 2002.
[4]
J. D. Brutlag. Aberrant behavior detection in time series for network monitoring. In Proc. of the 14th USENIX Systems Administration Conference, pages 139--146, 2000.
[5]
R. Burke, B. Mobasher, R. Bhaumik, and C. Williams. Segment-based injection attacks against collaborative filtering recommender systems. In Proc. of the IEEE Int. Conf. on Data Mining, pages 577--580, 2005.
[6]
P.-A. Chirita, W. Nejdl, and C. Zamfir. Preventing shilling attacks in online recommender systems. In Proc. of ACM Int. Workshop on Web Information and Data Management, pages 67--74, 2005.
[7]
E. Keogh, J. Lin, and A. Fu. HOT SAX: Finding the most unusual time series subsequence: Algorithms and applications. In Proc. of the IEEE Int. Conf. on Data Mining, pages 226--233, 2005.
[8]
A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. In Proc. of SIGCOMM, pages 217--228, 2005.
[9]
S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In Proc. of the 13th WWW, pages 393--402, 2004.
[10]
B. Mobasher, R. Burke, C. Williams, and R. Bhaumik. Analysis and detection of segment-focused attacks against collaborative recommendation. In Proceedings of the 2005 WebKDD Workshop (Lecture Notes in Computer Science), 2006.
[11]
M. O'Mahony, N. Hurley, N. Kushmerick, and G. Silvestre. Collaborative recommendation: A robust analysis. ACM Transactions on Internet Technology, 4(4):344--377, 2004.
[12]
L. Wasserman. All of Statistics: A Concise Course in Statistical Inference. Springer, 2004.
[13]
S. Zhang, J. Ford, and F. Makedon. Analysis of a low-dimensional linear model under recommendation attacks. In Proc. of the 29th ACM SIGIR, 2006.

Cited By

View all
  • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/3677328Online publication date: 25-Jul-2024
  • (2024)Detecting the adversarially-learned injection attacks via knowledge graphsInformation Systems10.1016/j.is.2024.102419125(102419)Online publication date: Nov-2024
  • (2023)POREProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620333(1703-1720)Online publication date: 9-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
August 2006
986 pages
ISBN:1595933395
DOI:10.1145/1150402
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 August 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. recommender systems
  3. shilling attacks
  4. time series

Qualifiers

  • Article

Conference

KDD06

Acceptance Rates

Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)1
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/3677328Online publication date: 25-Jul-2024
  • (2024)Detecting the adversarially-learned injection attacks via knowledge graphsInformation Systems10.1016/j.is.2024.102419125(102419)Online publication date: Nov-2024
  • (2023)POREProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620333(1703-1720)Online publication date: 9-Aug-2023
  • (2023)Influence-Driven Data Poisoning for Robust Recommender SystemsIEEE Transactions on Pattern Analysis and Machine Intelligence10.1109/TPAMI.2023.3274759(1-17)Online publication date: 2023
  • (2023)Experimental and Theoretical Study for the Popular Shilling Attacks Detection Methods in Collaborative Recommender SystemIEEE Access10.1109/ACCESS.2023.328940411(79358-79369)Online publication date: 2023
  • (2022)Shilling attack detection for collaborative recommender systems: a gradient boosting methodMathematical Biosciences and Engineering10.3934/mbe.202234219:7(7248-7271)Online publication date: 2022
  • (2022)Simulating real profiles for shilling attacksKnowledge-Based Systems10.1016/j.knosys.2021.107390230:COnline publication date: 22-Apr-2022
  • (2021)Triple Adversarial Learning for Influence based Poisoning Attack in Recommender SystemsProceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining10.1145/3447548.3467335(1830-1840)Online publication date: 14-Aug-2021
  • (2021)Fight Fire with Fire: Towards Robust Recommender Systems via Adversarial Poisoning TrainingProceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3404835.3462914(1074-1083)Online publication date: 11-Jul-2021
  • (2021)A CNN-based Hybrid Model and Architecture for Shilling Attack Detection2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)10.1109/CCECE53047.2021.9569048(1-7)Online publication date: 12-Sep-2021
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media