Skip to main content

Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic Features

  • Conference paper
  • First Online:
Web and Big Data (APWeb-WAIM 2024)

Abstract

In recommendation systems, malicious users manipulate system recommendations by injecting fake reviews or false co-visit behaviors, thereby gaining undue traffic and exposure, and ultimately compromising the fairness and accuracy of the recommendation results. Existing detection methods largely rely on static analysis of users’ historical ratings and click behaviors, neglecting the dynamic changes in user behavior over time. Additionally, detection methods based on deep learning usually require a large amount of labeled data to achieve excellent detection performance, which is often difficult to meet in practical applications. To address these issues, this paper proposes a malicious attack detection method for recommendation systems based on dynamic features and meta pseudo labels. By constructing a series of dynamic statistical features based on the time series of user behaviors, this method can effectively capture changes in behavior over time. At the same time, the application of meta-pseudo label technology expands the dataset and reduces the dependence on a large amount of labeled data. The use of a soft voting mechanism to integrate the detection results of the meta-pseudo label teacher and student models significantly improves the accuracy and robustness of detection compared to traditional meta-pseudo label methods with a single student model prediction. Experiments on real datasets have verified the high efficiency of this method under the condition of limited labeled samples.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://tianchi.aliyun.com/dataset/123862

References

  1. Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16, 729–748 (2013)

    Article  Google Scholar 

  2. Dou, T., Yu, J., Xiong, Q., Gao, M., Song, Y., Fang, Q.: Collaborative shilling detection bridging factorization and user embedding. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds.) CollaborateCom 2017. LNICST, vol. 252, pp. 459–469. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00916-8_43

    Chapter  Google Scholar 

  3. Hao, Y., Zhang, F.: An unsupervised detection method for shilling attacks based on deep learning and community detection. Soft. Comput. 25(1), 477–494 (2021)

    Article  Google Scholar 

  4. Hu, D.: An introductory survey on attention mechanisms in nlp problems. In: Intelligent Systems and Applications: Proceedings of the 2019 Intelligent Systems Conference (IntelliSys) Volume 2. pp. 432–448. Springer (2020)

    Google Scholar 

  5. Li, H., Gao, M., Zhou, F., Wang, Y., Fan, Q., Yang, L.: Fusing hypergraph spectral features for shilling attack detection. J. Info. Secur. Appl. 63, 103051 (2021)

    Google Scholar 

  6. Li, W., Gao, M., Li, H., Zeng, J., Xiong, Q., Hirokawa, S.: Shilling attack detection in recommender systems via selecting patterns analysis. IEICE Trans. Inf. Syst. 99(10), 2600–2611 (2016)

    Article  Google Scholar 

  7. Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User-Adap. Inter. 19, 65–97 (2009)

    Article  Google Scholar 

  8. Pham, H., Dai, Z., Xie, Q., Le, Q.V.: Meta pseudo labels. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 11557–11568 (2021)

    Google Scholar 

  9. Williams, C.A., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. SOCA 1(3), 157–170 (2007)

    Article  Google Scholar 

  10. Wu, Z., Wu, J., Cao, J., Tao, D.: Hysad: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985–993 (2012)

    Google Scholar 

  11. Yang, G., Gong, N.Z., Cai, Y.: Fake co-visitation injection attacks to recommender systems. In: NDSS (2017)

    Google Scholar 

  12. Zhang, F., Zhang, Z., Zhang, P., Wang, S.: UD-HMM: an unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering. Knowl.-Based Syst. 148, 146–166 (2018)

    Article  Google Scholar 

  13. Zhang, S., Yin, H., Chen, T., Hung, Q.V.N., Huang, Z., Cui, L.: GCN-based user representation learning for unifying robust recommendation and fraudster detection. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 689–698 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ke Ji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, H., Ji, K., Chen, Z., Ma, K., Zhao, X. (2024). Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic Features. In: Zhang, W., Tung, A., Zheng, Z., Yang, Z., Wang, X., Guo, H. (eds) Web and Big Data. APWeb-WAIM 2024. Lecture Notes in Computer Science, vol 14964. Springer, Singapore. https://doi.org/10.1007/978-981-97-7241-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-7241-4_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-7240-7

  • Online ISBN: 978-981-97-7241-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics