Skip to main content
Log in

A survey of attack detection approaches in collaborative filtering recommender systems

  • Published:
Artificial Intelligence Review Aims and scope Submit manuscript

Abstract

Nowadays, due to the increasing amount of data, the use of recommender systems has increased. Therefore, the quality of the recommendations for the users of these systems is very important. One of the recommender systems models is collaborative filtering (CF) which uses the ratings given by the users to the items. But many of these ratings may be noisy or inaccurate so they reduce the quality of the recommendations. Sometimes users, using fake profiles, try to change the recommendations in their favor. Since satisfaction and trust in such systems are very important and useful, it would be better to find a way to identify these types of users. Despite numerous studies on CF recommender systems, the design of a robust recommender system is still a challenging problem. In this paper, we have analyzed the 25 previous samples of research on collaborative filtering recommender system (CFRS) for attack detection from 2009 to 2019. Most of these papers focus mainly on movie recommendations. According to these analyzes, we have categorized attack detection methods on CFRS in four categories: clustering, classifying, feature extraction and probabilistic approaches. The evaluation measures, the dataset, and attacks features used in the attack detection approaches are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29
Fig. 30
Fig. 31
Fig. 32
Fig. 33
Fig. 34
Fig. 35
Fig. 36
Fig. 37
Fig. 38
Fig. 39
Fig. 40
Fig. 41
Fig. 42
Fig. 43
Fig. 44
Fig. 45
Fig. 46
Fig. 47
Fig. 48
Fig. 49

Similar content being viewed by others

Notes

  1. Artificial neural network.

  2. Support vector machines-target item analysis.

  3. Synthetic minority over-sampling technique.

  4. Rating deviation from mean agreement.

  5. Mean absolute error.

  6. Principal component analysis.

  7. High rating ratio.

  8. Receiver operating characteristic.

  9. DEgsime’ and Rdma target item analysis.

  10. Partition around medoid.

  11. Absolute difference between medoid points.

  12. Angle-based outlier detection.

  13. Classification-based approach.

  14. Multi-dimensional scaling.

  15. Group rating deviation from mean agreement.

  16. Value based neighbor selection.

  17. Mean similarity-based expected profit.

  18. Random filling method.

  19. Average filling method.

  20. Hybrid perspective recommender system.

  21. Shilling attack detection.

  22. Mean of total profit.

  23. Mean similarity-based expected profit.

  24. Unsupervised retrieval of attack profiles.

  25. Hilbert–Huang transform.

  26. Rdma and Degsim-Target Item Analysis.

  27. Area under curve.

  28. Weighted deviation from mean agreement.

  29. Length variance.

  30. Discrete wavelet transform support vector machine.

  31. Convolutional neural network-Shilling Attack Detection.

  32. Probabilistic latent semantics analysis.

  33. Semi-supervised attack detection.

  34. Expectation–maximization.

  35. Rating deviation from mean bias.

  36. Compromised item deviation analysis.

  37. http://movielens.org.

  38. https://grouplens.org/datasets/jester/.

  39. https://grouplens.org/datasets/eachmovie/.

  40. http://jmcauley.ucsd.edu/data/amazon/.

  41. http://academictorrents.com/details/9b13183dc4d60676b773c9e2cd6de5e5542cee9a.

  42. http://www2.informatik.uni-freiburg.de/~cziegler/BX/.

References

  • Adomavicius G, Tuzhilin A (2005) Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans Knowl Data Eng 17(6):734–749

    Article  Google Scholar 

  • Aggarwal CC (2016) Recommender systems. Springer, Berlin

    Book  Google Scholar 

  • Aghili G, Shajari M, Khadivi S, Morid MA (2011) Using genre interest of users to detect profile injection attacks in movie recommender systems. In: 2011 10th international conference on machine learning and applications and workshops (ICMLA). IEEE, pp 49–52

  • Bhaumik R, Williams C, Mobasher B, Burke R (2006) Securing collaborative filtering against malicious attacks through anomaly detection. In: Proceedings of the 4th workshop on intelligent techniques for web personalization (ITWP’06), Boston, p 10

  • Bhaumik R, Mobasher B, Burke R (2011) A clustering approach to unsupervised attack detection in collaborative recommender systems. In: Proceedings of the international conference on data mining (DMIN). Citeseer, p 1

  • Burke R, Mobasher B, Bhaumik R (2005) Limited knowledge shilling attacks in collaborative filtering systems. In: Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI 2005), pp 17–24

  • Cai Y, Zhu D (2019) Trustworthy and profit: a new value-based neighbor selection method in recommender systems under shilling attacks. Decis Support Syst 124:113112

    Article  Google Scholar 

  • Cao J, Wu Z, Mao B, Zhang Y (2013) Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6):729–748

    Article  Google Scholar 

  • Chakraborty P, Karforma SJPT (2013) Detection of profile-injection attacks in recommender systems using outlier analysis. Procedia Technol 10:963–969

    Article  Google Scholar 

  • Cheng Z, Hurley N (2009) Effective diverse and obfuscated attacks on model-based recommender systems. In: Proceedings of the third ACM conference on recommender systems. ACM, pp 141–148

  • Chirita P-A, Nejdl W, Zamfir C (2005) Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th annual ACM international workshop on web information and data management. ACM, pp 67–74

  • Chung C-Y, Hsu P-Y, Huang S-H (2013) Βp: a novel approach to filter out malicious rating profiles from recommender systems. Decis Support Syst 55(1):314–325

    Article  Google Scholar 

  • He F, Wang X, Liu B (2010) Attack detection by rough set theory in recommendation system. In: 2010 IEEE international conference on granular computing (GrC). IEEE, pp 692–695

  • Herlocker JL, Konstan JA, Borchers A, Riedl J (2017) An algorithmic framework for performing collaborative filtering. In: ACM SIGIR forum. ACM, pp 227–234

  • Hurley N, Cheng Z, Zhang M (2009) Statistical attack detection. In: Proceedings of the third ACM conference on recommender systems, pp 149–156

  • Jamali M, Ester M (2010) A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the fourth ACM conference on recommender systems. ACM, pp 135–142

  • Javari A, Jalili M (2015) A probabilistic model to resolve diversity–accuracy challenge of recommendation systems. Knowl Inf Syst 44(3):609–627

    Article  Google Scholar 

  • Karthikeyan P, Selvi ST, Neeraja G, Deepika R, Vincent A, Abinaya V (2017) Prevention of shilling attack in recommender systems using discrete wavelet transform and support vector machine. In: 2017 IEEE eighth international conference, pp 99–104

  • Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: Proceedings of the 13th international conference on world wide web. ACM, pp 393–402

  • Lee J-S, Zhu D (2012) Shilling attack detection—a new approach for a trustworthy recommender system. INFORMS J Comput 24(1):117–131

    Article  Google Scholar 

  • Li C, Luo Z (2011) Detection of shilling attacks in collaborative filtering recommender systems. In: 2011 international conference of soft computing and pattern recognition (SoCPaR). IEEE, pp 190–193

  • Massa P, Avesani P (2004) Trust-aware collaborative filtering for recommender systems. In: OTM confederated international conferences” On the Move to Meaningful Internet Systems”. Springer, pp 492–508

  • Mobasher B, Burke R, Sandvig JJ (2006) Model-based collaborative filtering as a defense against profile injection attacks. In: AAAI, p 1388

  • Moradi P, Rezaimehr F, Ahmadian S, Jalili M (2016) A trust-aware recommender algorithm based on users overlapping community structure. In: 2016 Sixteenth international conference on advances in ICT for emerging regions (ICTer). IEEE, pp 162–167

  • Navgaran DZ, Moradi P, Akhlaghian F (2013) Evolutionary based matrix factorization method for collaborative filtering systems. In: 2013 21st Iranian conference on electrical engineering (ICEE). IEEE, pp 1–5

  • O’Mahony M, Hurley N, Kushmerick N, Silvestre G (2004) Collaborative recommendation: a robustness analysis. ACM Trans Internet Technol (TOIT) 4(4):344–377

    Article  Google Scholar 

  • Pirasteh P, Hwang D, Jung JJ (2015) Exploiting matrix factorization to asymmetric user similarities in recommendation systems. Knowl Based Syst 83:51–57

    Article  Google Scholar 

  • Ramezani M, Moradi P, Akhlaghian F (2014) A pattern mining approach to enhance the accuracy of collaborative filtering in sparse data domains. Phys A Stat Mech Appl 408:72–84

    Article  Google Scholar 

  • Ranjbar M, Moradi P, Azami M, Jalili M (2015) An imputation-based matrix factorization method for improving accuracy of collaborative filtering systems. Eng Appl Artif Intell 46:58–66

    Article  Google Scholar 

  • Rezaeimehr F, Moradi P, Ahmadian S, Qader NN, Jalili M (2018) Tcars: time-and community-aware recommendation system. Future Gener Comput Syst 78:419–429

    Article  Google Scholar 

  • Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th international conference on world wide web. ACM, pp 285–295

  • Si M, Li Q (2020) Shilling attacks against collaborative recommender systems: a review. Artif Intell Rev 53(1):291–319

    Article  MathSciNet  Google Scholar 

  • Srikanth T, Shashi M (2019) New metrics for effective detection of shilling attacks in recommender systems. J Inf Eng Electron Bus 4:33–42

    Google Scholar 

  • Su X-F, Zeng H-J, Chen Z (2005) Finding group shilling in recommendation system. In: Special interest tracks and posters of the 14th international conference on world wide web. ACM, pp 960–961

  • Tong C, Yin X, Li J, Zhu T, Lv R, Sun L, Rodrigues JJJTCJ (2018) A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. The Computer Journal 61(7):949–958

    Article  Google Scholar 

  • Williams C, Mobasher B (2006) Profile injection attack detection for securing collaborative recommender systems, pp 1–47

  • Yang Z, Cai Z, Guan X (2016a) Estimating user behavior toward detecting anomalous ratings in rating systems. Knowl Based Syst 111:144–158

    Article  Google Scholar 

  • Yang Z, Xu L, Cai Z, Xu Z (2016b) Re-scale adaboost for attack detection in collaborative filtering recommender systems. Knowl Based Syst 100:74–88

    Article  Google Scholar 

  • Yang L, Huang W, Niu X (2017) Defending shilling attacks in recommender systems using soft co-clustering. IET Inf Secur 11(6):319–325

    Article  Google Scholar 

  • Yang F, Gao M, Yu J, Song Y, Wang X (2018) Detection of shilling attack based on bayesian model and user embedding. In: 2018 IEEE 30th international conference on tools with artificial intelligence (ICTAI). IEEE, pp 639–646

  • Zhang F, Zhou QJJC (2012) A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems. J Comput 7(1):226–234

    Google Scholar 

  • Zhang F, Zhou Q (2014) HHT–SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl Based Syst 65:96–105

    Article  Google Scholar 

  • Zhang F, Deng Z-J, He Z-M, Lin X-C, Sun L-L (2018a) Detection of shilling attack in collaborative filtering recommender system by PCA and data complexity. In: 2018 international conference on machine learning and cybernetics (ICMLC). IEEE, pp 673–678

  • Zhang F, Zhang Z, Zhang P, Wang S (2018b) Ud-hmm: an unsupervised method for shilling attack detection based on hidden markov model and hierarchical clustering. Knowl Based Syst 148:146–166

    Article  Google Scholar 

  • Zhou Q (2016) Supervised approach for detecting average over popular items attack in collaborative recommender systems. IET Inf Secur 10(3):134–141

    Article  Google Scholar 

  • Zhou Q, Zhang F (2012) A hybrid unsupervised approach for detecting profile injection attacks in collaborative recommender systems. J Comput 9(3):687–694

    Google Scholar 

  • Zhou W, Koh YS, Wen J, Alam S, Dobbie G (2014) Detection of abnormal profiles on group attacks in recommender systems. In: Proceedings of the 37th international ACM SIGIR conference on research & development in information retrieval. ACM, pp 955–958

  • Zhou W, Wen J, Koh YS, Xiong Q, Gao M, Dobbie G, Alam S (2015) Shilling attacks detection in recommender systems based on target item analysis. PloS one 10(7):e0130968

    Article  Google Scholar 

  • Zhou W, Wen J, Xiong Q, Gao M, Zeng JJN (2016) SVM-TIA a shilling attack detection method based on svm and target item analysis in recommender systems. Neurocomputing 210:197–205

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chitra Dadkhah.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rezaimehr, F., Dadkhah, C. A survey of attack detection approaches in collaborative filtering recommender systems. Artif Intell Rev 54, 2011–2066 (2021). https://doi.org/10.1007/s10462-020-09898-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10462-020-09898-3

Keywords

Navigation