Skip to main content

AGSA: Anti-similarity Group Shilling Attacks

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 729))

Abstract

With the rapid development of e-commerce, the security issues of recommender systems have been widely investigated. Malicious users can benefit from injecting great quantities of fake profiles into recommender systems to reduce the frequency of undesired recommendation items. As one of the most important attack methods in recommender systems, the shilling attack has been paid considerable attention, especially to its model and the way to detect it. Although a multitude of studies have been devoted to shilling attack modeling and detection, few of them focus on group shilling attack. The attackers in a shilling group work together to manipulate the output of the recommender system. Based on the model of the loose version of Group Shilling Attack Generation Algorithm (GSAGenl), we design an anti-similarity group shilling attack model (AGSA). AGSA rationalizes the evaluation time interval of the group attack and strengthens the destructive powers of the group shilling attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bobadilla, J., Ortega, F., Hernando, A., Gutiérrez, A.: Recommender systems survey. Knowl.-Based Syst. 46, 109–132 (2013). doi:10.1016/j.knosys.2013.03.012

    Article  Google Scholar 

  2. Bhebe, W., Kogeda, O.P.: Shilling attack detection in collaborative recommender systems using a meta learning strategy. In: 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), Namibia, Windhoek, 17–20 May 2015, pp. 56–61. IEEE (May 2015). doi:10.1109/ETNCC.2015.7184808

  3. Fuguo, Z.: Analysis of profile injection attacks against recommendation algorithms on bipartite networks. In: 2014 International Conference on Management of e-Commerce and e-Government (ICMeCG), Shanghai, China, 31 October–2 November 2014, pp. 1–5. IEEE (October 2014). doi:10.1109/ICMeCG.2014.10

  4. Zhang, Z., Kulkarni, S.R.: Detection of shilling attacks in recommender systems via spectral clustering. In: 2014 17th International Conference on Information Fusion (FUSION), Salamanca, Spain, 7–10 July 2014, pp. 1–8. IEEE (July 2014). [DBLP: db/conf/fusion/fusion2014.html]

  5. Zhang, F., Sun, S., Yi, H.: Robust collaborative recommendation algorithm based on kernel function and Welsch reweighted M-estimator. IET Inf. Secur. 9(5), 257–265 (2015). doi:10.1049/iet-ifs.2014.0488

    Article  Google Scholar 

  6. Masinde, N.W., Fatima, S.S.: Effect of varying filler-size in profile injection attacks on the Robust Weighted Slope One. In: 2014 Pan African Conference on Science, Computing and Telecommunications (PACT), Kampala, Uganda, 27–29 July, 2015, pp. 92–97. IEEE (July 2014). doi:10.1109/SCAT.2014.7055125

  7. Wang, Y., Wu, Z., Cao, J., Fang, C.: Towards a tricksy group shilling attack model against recommender systems. In: Zhou, S., Zhang, S., Karypis, G. (eds.) ADMA 2012. LNCS, vol. 7713, pp. 675–688. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35527-1_56

    Chapter  Google Scholar 

  8. Noh, G., Kim, C.K.: RobuRec: robust Sybil attack defense in online recommender systems. In: 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013, pp. 2001–2005. IEEE (June 2013). doi:10.1109/ICC.2013.6654818

  9. Wang, Y., Zhang, L.: A comparative study of shilling attack detectors for recommender systems. In: 2015 12th International Conference on Service Systems and Service Management (ICSSSM), Guangzhou, China, June 22–24 2015, pp. 1–6. IEEE (2015). doi:10.1109/ICSSSM.2015.7170330

  10. Hattori, S., Takama, Y.: Consideration about applicability of recommender system employing personal-value-based user model. In: 2013 Conference on Technologies and Applications of Artificial Intelligence, Taipei, Taiwan, 6–8 December 2013, pp. 282–287. IEEE (2013). doi:10.1109/TAAI.2013.63

Download references

Acknowledgment

This work was supported by the National Natural Science Foundation of P. R. China (Nos. 61672297, 61572260 and 61373138), the Key Research and Development Program of Jiangsu Province (Social Development Program, Nos. BE2016185 and BE2016177), Postdoctoral Foundation (Nos. 2015M570468 and 2016T90485), The Sixth Talent Peaks Project of Jiangsu Province (No. DZXX-017), Jiangsu Natural Science Foundation for Excellent Young Scholar (No. BK20160089), the Fund of Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks (WSNLBZY201516).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haiping Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd

About this paper

Cite this paper

Wang, P., Qi, L., Huang, H., Li, F., Yu, C. (2017). AGSA: Anti-similarity Group Shilling Attacks. In: Chen, G., Shen, H., Chen, M. (eds) Parallel Architecture, Algorithm and Programming. PAAP 2017. Communications in Computer and Information Science, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-6442-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6442-5_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6441-8

  • Online ISBN: 978-981-10-6442-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics