Abstract
In recommendation systems, malicious users manipulate system recommendations by injecting fake reviews or false co-visit behaviors, thereby gaining undue traffic and exposure, and ultimately compromising the fairness and accuracy of the recommendation results. Existing detection methods largely rely on static analysis of users’ historical ratings and click behaviors, neglecting the dynamic changes in user behavior over time. Additionally, detection methods based on deep learning usually require a large amount of labeled data to achieve excellent detection performance, which is often difficult to meet in practical applications. To address these issues, this paper proposes a malicious attack detection method for recommendation systems based on dynamic features and meta pseudo labels. By constructing a series of dynamic statistical features based on the time series of user behaviors, this method can effectively capture changes in behavior over time. At the same time, the application of meta-pseudo label technology expands the dataset and reduces the dependence on a large amount of labeled data. The use of a soft voting mechanism to integrate the detection results of the meta-pseudo label teacher and student models significantly improves the accuracy and robustness of detection compared to traditional meta-pseudo label methods with a single student model prediction. Experiments on real datasets have verified the high efficiency of this method under the condition of limited labeled samples.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16, 729–748 (2013)
Dou, T., Yu, J., Xiong, Q., Gao, M., Song, Y., Fang, Q.: Collaborative shilling detection bridging factorization and user embedding. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds.) CollaborateCom 2017. LNICST, vol. 252, pp. 459–469. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00916-8_43
Hao, Y., Zhang, F.: An unsupervised detection method for shilling attacks based on deep learning and community detection. Soft. Comput. 25(1), 477–494 (2021)
Hu, D.: An introductory survey on attention mechanisms in nlp problems. In: Intelligent Systems and Applications: Proceedings of the 2019 Intelligent Systems Conference (IntelliSys) Volume 2. pp. 432–448. Springer (2020)
Li, H., Gao, M., Zhou, F., Wang, Y., Fan, Q., Yang, L.: Fusing hypergraph spectral features for shilling attack detection. J. Info. Secur. Appl. 63, 103051 (2021)
Li, W., Gao, M., Li, H., Zeng, J., Xiong, Q., Hirokawa, S.: Shilling attack detection in recommender systems via selecting patterns analysis. IEICE Trans. Inf. Syst. 99(10), 2600–2611 (2016)
Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User-Adap. Inter. 19, 65–97 (2009)
Pham, H., Dai, Z., Xie, Q., Le, Q.V.: Meta pseudo labels. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 11557–11568 (2021)
Williams, C.A., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. SOCA 1(3), 157–170 (2007)
Wu, Z., Wu, J., Cao, J., Tao, D.: Hysad: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985–993 (2012)
Yang, G., Gong, N.Z., Cai, Y.: Fake co-visitation injection attacks to recommender systems. In: NDSS (2017)
Zhang, F., Zhang, Z., Zhang, P., Wang, S.: UD-HMM: an unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering. Knowl.-Based Syst. 148, 146–166 (2018)
Zhang, S., Yin, H., Chen, T., Hung, Q.V.N., Huang, Z., Cui, L.: GCN-based user representation learning for unifying robust recommendation and fraudster detection. In: Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 689–698 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, H., Ji, K., Chen, Z., Ma, K., Zhao, X. (2024). Malicious Attack Detection Method for Recommendation Systems Based on Meta-pseudo Labels and Dynamic Features. In: Zhang, W., Tung, A., Zheng, Z., Yang, Z., Wang, X., Guo, H. (eds) Web and Big Data. APWeb-WAIM 2024. Lecture Notes in Computer Science, vol 14964. Springer, Singapore. https://doi.org/10.1007/978-981-97-7241-4_24
Download citation
DOI: https://doi.org/10.1007/978-981-97-7241-4_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-7240-7
Online ISBN: 978-981-97-7241-4
eBook Packages: Computer ScienceComputer Science (R0)