Abstract
Attacks on Collaborative Filtering Recommender Systems (RS) can bias recommendations, potentially causing users to distrust results and the overall system. Attackers constantly innovate, and understanding the implications of novel attack vectors on system robustness is important for designers and operators. Foundational research on attacks in RSs studied attack user profiles based on straightforward models such as random or average ratings data. We are studying a novel category of attack based explicitly on measures of influence, in particular the potential impact of high-influence power users. This paper describes our approach to generate synthetic attack profiles that emulate influence characteristics of real power users, and it studies the impact of attack vectors that use synthetic power user profiles. We evaluate both the quality of synthetic power user profiles and the effectiveness of the attack, on both user-based and matrix-factorization-based recommender systems. Results show that synthetic user profiles that model real power users are an effective way of attacking collaborative recommender systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
O’Mahony, M.P., Hurley, N., Silvestre, G.C.M.: Recommender systems: Attack types and strategies. In: Proceedings of the 20th National Conference on Artificial Intelligence, AAAI 2005 (2005)
Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: Proceedings of the 13th International Conference on World Wide Web. ACM (2004)
Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Technol. (2007)
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, New York (1994)
Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of KDD 2001. ACM (2001)
Anand, S.S., Griffiths, N.: A market-based approach to address the new item problem. In: Proceedings of the ACM Recommender Systems Conference (2011)
Seminario, C.E., Wilson, D.C.: Assessing impacts of a power user attack on a matrix factorization collaborative recommender system. In: Proceedings of the 27th Florida Artificial Intelligence Research Society Conference (to appear, 2014)
Wilson, D.C., Seminario, C.E.: When power users attack: assessing impacts in collaborative recommender systems. In: Proceedings of the 7th ACM Conference on Recommender Systems, RecSys 2013. ACM (2013)
Desrosiers, C., Karypis, G.: A comprehensive survey of neighborhood-based recommendations methods. In: Ricci, F., Rokach, L., Shapira, B., Kantor, P.B. (eds.) Recommender Systems Handbook. Springer (2011)
Sarwar, B.M., Karypis, G., Konstan, J.A., Riedl, J.T.: Application of dimensionality reduction in recommender system – a case study. In: ACM WEBKDD Workshop (2000)
Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer (2009)
Amatriain, X., Jaimes, A., Oliver, N., Pujol, J.M.: Data mining methods for recommender systems. In: Ricci, F., et al. (eds.) Recommender Systems Handbook. Springer (2011)
Burke, R., O’Mahony, M.P., Hurley, N.J.: Robust collaborative recommendation. In: Ricci, F., et al. (eds.) Recommender Systems Handbook. Springer (2011)
Rashid, A., Karypis, G., Riedl, J.: Influence in ratings-based recommender systems: An algorithm-independent approach. In: Proceedings of the SIAM International Conference on Data Mining (2005)
Herlocker, J.L., Konstan, J.A., Terveen, L.G., Riedl, J.: Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems (2004)
Goyal, A., Lakshmanan, L.V.S.: Recmax: Exploiting recommender systems for fun and profit. In: Proceedings of KDD 2012 (2012)
Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of KDD 2003 (2003)
Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: Proc of the ACM SIGIR Conf. (1999)
Lathia, N., Hailes, S., Capra, L.: knn cf: A temporal social network. In: Proceedings of the 2nd ACM Recommender Systems Conference, RecSys 2008 (2008)
Seminario, C.E.: Accuracy and robustness impacts of power user attacks on collaborative recommender systems. In: Proceedings of the 7th ACM Conference on Recommender systems, RecSys 2013. ACM Press, New York (2013)
Shani, G., Gunawardana, A.: Evaluating recommendation systems. In: Ricci, F., et al. (eds.) Recommender Systems Handbook. Springer (2011)
Mehta, B., Nejdl, W.: Attack resistant collaborative filtering. In: SIGIR 2008: Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Wilson, D.C., Seminario, C.E. (2014). Evil Twins: Modeling Power Users in Attacks on Recommender Systems. In: Dimitrova, V., Kuflik, T., Chin, D., Ricci, F., Dolog, P., Houben, GJ. (eds) User Modeling, Adaptation, and Personalization. UMAP 2014. Lecture Notes in Computer Science, vol 8538. Springer, Cham. https://doi.org/10.1007/978-3-319-08786-3_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-08786-3_20
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08785-6
Online ISBN: 978-3-319-08786-3
eBook Packages: Computer ScienceComputer Science (R0)