Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1454008.1454034acmconferencesArticle/Chapter ViewAbstractPublication PagesrecsysConference Proceedingsconference-collections
research-article

Unsupervised retrieval of attack profiles in collaborative recommender systems

Published: 23 October 2008 Publication History

Abstract

Trust, reputation and recommendation are key components of successful e-commerce systems. However, e-commerce systems are also vulnerable in this respect because there are opportunities for sellers to gain advantage through manipulation of reputation and recommendation. One such vulnerability is the use of fraudulent user profiles to boost (or damage) the ratings of items in an online recommender system. In this paper we cast this problem as a problem of detecting anomalous structure in network analysis and propose a novel mechanism for detecting this anomalous structure. We present an evaluation that shows that this approach is effective at uncovering the types of recommender systems attack described in the literature.

References

[1]
J. Aguilar-Ruiz. Shifting and scaling patterns from gene expression data. Bioinformatics, 21(20):3840--3845, 2005.
[2]
P. O. Boykin and V. P. Roychowdhury. Leveraging social networks to fight spam. IEEE Computer, 38(4):61--68, 2005.
[3]
K. Bryan and P. Cunningham. Bottom-Up Biclustering of Expression Data. Comp. Intelligence and Bioinformatics and Comp. Bio., 2006. CIBCB'06. 2006 IEEE Symposium on, pages 1--8, 2006.
[4]
K. Bryan and P. Cunningham. BALBOA: Extending Bicluster Analysis to Classify ORFs using Expression Data. Bioinformatics and Bioengineering, 2007. BIBE 2007. Proceedings of the 7th IEEE International Conference on, pages 995--1002, 2007.
[5]
R. Burke, B. Mobasher, C. Williams, and R. Bhaumik. Classification features for attack detection in collaborative recommender systems. Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 542--547, 2006.
[6]
Y. Cheng and G. Church. Biclustering of expression data. Proc Int Conf Intell Syst Mol Biol, 8:93--103, 2000.
[7]
P. Chirita, W. Nejdl, and C. Zamfir. Preventing shilling attacks in online recommender systems. Proceedings of the seventh ACM international workshop on Web information and data management, pages 67--74, 2005.
[8]
S. Lam and J. Riedl. Shilling recommender systems for fun and profit. Proceedings of the 13th conference on World Wide Web, pages 393--402, 2004.
[9]
B. Mehta, T. Hofmann, and P. Fankhauser. Lies and propaganda: detecting spam users in collaborative filtering. Proceedings of the 12th international conference on Intelligent user interfaces, pages 14--21, 2007.
[10]
R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. Network Motifs: Simple Building Blocks of Complex Networks, 2002.
[11]
B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 7(4), 2007.
[12]
M. P. O'Mahony, N. J. Hurley, N. Kushmerick, and G. C. M. Silvestre. Collaborative recommendation: A robustness analysis. ACM Trans. Internet Techn., 4(4):344--377, 2004.
[13]
M. P. O'Mahony, N. J. Hurley, and G. C. M. Silvestre. Recommender systems: Attack types and strategies. In M. M. Veloso and S. Kambhampati, editors, AAAI, pages 334--339. AAAI Press / The MIT Press, 2005.
[14]
M. P. O'Mahony, N. J. Hurley, and G. C. M. Silvestre. Detecting noise in recommender system databases. In Proceedings of the International Conference on Intelligent User Interfaces (IUI'06), pages 109--115, Jan 29-Feb 1 2006.
[15]
P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J.Riedl. Grouplens: An open architecture for collaborative filtering of netnews. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW'94), pages 175--186, October 22-26 1994.
[16]
Z. Saul and V. Filkov. Exploring biological network structure using exponential random graph models. Bioinformatics, 23(19):2604, 2007.
[17]
C. Williams, B. Mobasher, R. Burke, J. Sandvig, and R. Bhaumik. Detection of Obfuscated Attacks in Collaborative Recommender Systems. Proceedings of the ECAI06 workshop on recommender systems, Held at the 17th European Conference on Artificial Intelligence (ECAI'06), Riva del Garda, Italy, August, 2006.
[18]
A. Zinman and J. S. Donath. Is Britney Spears spam? In In Proceedings of Fourth Conference on Email and Anti-Spam, Mountain View, CA, 2007.

Cited By

View all
  • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/367732857:1(1-39)Online publication date: 7-Oct-2024
  • (2024)Learning How to Rank and Collecting User BehaviorRecommender Systems: Algorithms and their Applications10.1007/978-981-97-0538-2_5(39-54)Online publication date: 12-Jun-2024
  • (2023)Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative FilteringAutomatic Control and Computer Sciences10.3103/S014641162308004757:8(868-874)Online publication date: 1-Dec-2023
  • Show More Cited By

Index Terms

  1. Unsupervised retrieval of attack profiles in collaborative recommender systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    RecSys '08: Proceedings of the 2008 ACM conference on Recommender systems
    October 2008
    348 pages
    ISBN:9781605580937
    DOI:10.1145/1454008
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 October 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. attack detection
    2. recommender system
    3. shilling

    Qualifiers

    • Research-article

    Conference

    RecSys08: ACM Conference on Recommender Systems
    October 23 - 25, 2008
    Lausanne, Switzerland

    Acceptance Rates

    Overall Acceptance Rate 254 of 1,295 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)13
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 27 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/367732857:1(1-39)Online publication date: 7-Oct-2024
    • (2024)Learning How to Rank and Collecting User BehaviorRecommender Systems: Algorithms and their Applications10.1007/978-981-97-0538-2_5(39-54)Online publication date: 12-Jun-2024
    • (2023)Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative FilteringAutomatic Control and Computer Sciences10.3103/S014641162308004757:8(868-874)Online publication date: 1-Dec-2023
    • (2023)Experimental and Theoretical Study for the Popular Shilling Attacks Detection Methods in Collaborative Recommender SystemIEEE Access10.1109/ACCESS.2023.328940411(79358-79369)Online publication date: 2023
    • (2022)A Survey on Recommender Systems Challenges and Solutions2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)10.1109/MIUCC55081.2022.9781739(296-301)Online publication date: 8-May-2022
    • (2021)Sequential Attack Detection in Recommender SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.307629516(3285-3298)Online publication date: 2021
    • (2020)Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means ClusteringIEEE Transactions on Computational Social Systems10.1109/TCSS.2020.30138787:5(1189-1199)Online publication date: Oct-2020
    • (2020)A Shilling Attack Model Based on TextCNN2020 IEEE 3rd International Conference on Automation, Electronics and Electrical Engineering (AUTEEE)10.1109/AUTEEE50969.2020.9315588(282-289)Online publication date: 20-Nov-2020
    • (2020)Understanding Shilling Attacks and Their Detection Traits: A Comprehensive SurveyIEEE Access10.1109/ACCESS.2020.30229628(171703-171715)Online publication date: 2020
    • (2020)Analysis on Detection of Shilling Attack in Recommendation SystemMobile Radio Communications and 5G Networks10.1007/978-981-15-7130-5_8(117-128)Online publication date: 29-Sep-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media