Abstract
Nowadays, due to the increasing amount of data, the use of recommender systems has increased. Therefore, the quality of the recommendations for the users of these systems is very important. One of the recommender systems models is collaborative filtering (CF) which uses the ratings given by the users to the items. But many of these ratings may be noisy or inaccurate so they reduce the quality of the recommendations. Sometimes users, using fake profiles, try to change the recommendations in their favor. Since satisfaction and trust in such systems are very important and useful, it would be better to find a way to identify these types of users. Despite numerous studies on CF recommender systems, the design of a robust recommender system is still a challenging problem. In this paper, we have analyzed the 25 previous samples of research on collaborative filtering recommender system (CFRS) for attack detection from 2009 to 2019. Most of these papers focus mainly on movie recommendations. According to these analyzes, we have categorized attack detection methods on CFRS in four categories: clustering, classifying, feature extraction and probabilistic approaches. The evaluation measures, the dataset, and attacks features used in the attack detection approaches are discussed.

















































Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
Artificial neural network.
Support vector machines-target item analysis.
Synthetic minority over-sampling technique.
Rating deviation from mean agreement.
Mean absolute error.
Principal component analysis.
High rating ratio.
Receiver operating characteristic.
DEgsime’ and Rdma target item analysis.
Partition around medoid.
Absolute difference between medoid points.
Angle-based outlier detection.
Classification-based approach.
Multi-dimensional scaling.
Group rating deviation from mean agreement.
Value based neighbor selection.
Mean similarity-based expected profit.
Random filling method.
Average filling method.
Hybrid perspective recommender system.
Shilling attack detection.
Mean of total profit.
Mean similarity-based expected profit.
Unsupervised retrieval of attack profiles.
Hilbert–Huang transform.
Rdma and Degsim-Target Item Analysis.
Area under curve.
Weighted deviation from mean agreement.
Length variance.
Discrete wavelet transform support vector machine.
Convolutional neural network-Shilling Attack Detection.
Probabilistic latent semantics analysis.
Semi-supervised attack detection.
Expectation–maximization.
Rating deviation from mean bias.
Compromised item deviation analysis.
References
Adomavicius G, Tuzhilin A (2005) Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans Knowl Data Eng 17(6):734–749
Aggarwal CC (2016) Recommender systems. Springer, Berlin
Aghili G, Shajari M, Khadivi S, Morid MA (2011) Using genre interest of users to detect profile injection attacks in movie recommender systems. In: 2011 10th international conference on machine learning and applications and workshops (ICMLA). IEEE, pp 49–52
Bhaumik R, Williams C, Mobasher B, Burke R (2006) Securing collaborative filtering against malicious attacks through anomaly detection. In: Proceedings of the 4th workshop on intelligent techniques for web personalization (ITWP’06), Boston, p 10
Bhaumik R, Mobasher B, Burke R (2011) A clustering approach to unsupervised attack detection in collaborative recommender systems. In: Proceedings of the international conference on data mining (DMIN). Citeseer, p 1
Burke R, Mobasher B, Bhaumik R (2005) Limited knowledge shilling attacks in collaborative filtering systems. In: Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI 2005), pp 17–24
Cai Y, Zhu D (2019) Trustworthy and profit: a new value-based neighbor selection method in recommender systems under shilling attacks. Decis Support Syst 124:113112
Cao J, Wu Z, Mao B, Zhang Y (2013) Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6):729–748
Chakraborty P, Karforma SJPT (2013) Detection of profile-injection attacks in recommender systems using outlier analysis. Procedia Technol 10:963–969
Cheng Z, Hurley N (2009) Effective diverse and obfuscated attacks on model-based recommender systems. In: Proceedings of the third ACM conference on recommender systems. ACM, pp 141–148
Chirita P-A, Nejdl W, Zamfir C (2005) Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th annual ACM international workshop on web information and data management. ACM, pp 67–74
Chung C-Y, Hsu P-Y, Huang S-H (2013) Βp: a novel approach to filter out malicious rating profiles from recommender systems. Decis Support Syst 55(1):314–325
He F, Wang X, Liu B (2010) Attack detection by rough set theory in recommendation system. In: 2010 IEEE international conference on granular computing (GrC). IEEE, pp 692–695
Herlocker JL, Konstan JA, Borchers A, Riedl J (2017) An algorithmic framework for performing collaborative filtering. In: ACM SIGIR forum. ACM, pp 227–234
Hurley N, Cheng Z, Zhang M (2009) Statistical attack detection. In: Proceedings of the third ACM conference on recommender systems, pp 149–156
Jamali M, Ester M (2010) A matrix factorization technique with trust propagation for recommendation in social networks. In: Proceedings of the fourth ACM conference on recommender systems. ACM, pp 135–142
Javari A, Jalili M (2015) A probabilistic model to resolve diversity–accuracy challenge of recommendation systems. Knowl Inf Syst 44(3):609–627
Karthikeyan P, Selvi ST, Neeraja G, Deepika R, Vincent A, Abinaya V (2017) Prevention of shilling attack in recommender systems using discrete wavelet transform and support vector machine. In: 2017 IEEE eighth international conference, pp 99–104
Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: Proceedings of the 13th international conference on world wide web. ACM, pp 393–402
Lee J-S, Zhu D (2012) Shilling attack detection—a new approach for a trustworthy recommender system. INFORMS J Comput 24(1):117–131
Li C, Luo Z (2011) Detection of shilling attacks in collaborative filtering recommender systems. In: 2011 international conference of soft computing and pattern recognition (SoCPaR). IEEE, pp 190–193
Massa P, Avesani P (2004) Trust-aware collaborative filtering for recommender systems. In: OTM confederated international conferences” On the Move to Meaningful Internet Systems”. Springer, pp 492–508
Mobasher B, Burke R, Sandvig JJ (2006) Model-based collaborative filtering as a defense against profile injection attacks. In: AAAI, p 1388
Moradi P, Rezaimehr F, Ahmadian S, Jalili M (2016) A trust-aware recommender algorithm based on users overlapping community structure. In: 2016 Sixteenth international conference on advances in ICT for emerging regions (ICTer). IEEE, pp 162–167
Navgaran DZ, Moradi P, Akhlaghian F (2013) Evolutionary based matrix factorization method for collaborative filtering systems. In: 2013 21st Iranian conference on electrical engineering (ICEE). IEEE, pp 1–5
O’Mahony M, Hurley N, Kushmerick N, Silvestre G (2004) Collaborative recommendation: a robustness analysis. ACM Trans Internet Technol (TOIT) 4(4):344–377
Pirasteh P, Hwang D, Jung JJ (2015) Exploiting matrix factorization to asymmetric user similarities in recommendation systems. Knowl Based Syst 83:51–57
Ramezani M, Moradi P, Akhlaghian F (2014) A pattern mining approach to enhance the accuracy of collaborative filtering in sparse data domains. Phys A Stat Mech Appl 408:72–84
Ranjbar M, Moradi P, Azami M, Jalili M (2015) An imputation-based matrix factorization method for improving accuracy of collaborative filtering systems. Eng Appl Artif Intell 46:58–66
Rezaeimehr F, Moradi P, Ahmadian S, Qader NN, Jalili M (2018) Tcars: time-and community-aware recommendation system. Future Gener Comput Syst 78:419–429
Sarwar B, Karypis G, Konstan J, Riedl J (2001) Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th international conference on world wide web. ACM, pp 285–295
Si M, Li Q (2020) Shilling attacks against collaborative recommender systems: a review. Artif Intell Rev 53(1):291–319
Srikanth T, Shashi M (2019) New metrics for effective detection of shilling attacks in recommender systems. J Inf Eng Electron Bus 4:33–42
Su X-F, Zeng H-J, Chen Z (2005) Finding group shilling in recommendation system. In: Special interest tracks and posters of the 14th international conference on world wide web. ACM, pp 960–961
Tong C, Yin X, Li J, Zhu T, Lv R, Sun L, Rodrigues JJJTCJ (2018) A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. The Computer Journal 61(7):949–958
Williams C, Mobasher B (2006) Profile injection attack detection for securing collaborative recommender systems, pp 1–47
Yang Z, Cai Z, Guan X (2016a) Estimating user behavior toward detecting anomalous ratings in rating systems. Knowl Based Syst 111:144–158
Yang Z, Xu L, Cai Z, Xu Z (2016b) Re-scale adaboost for attack detection in collaborative filtering recommender systems. Knowl Based Syst 100:74–88
Yang L, Huang W, Niu X (2017) Defending shilling attacks in recommender systems using soft co-clustering. IET Inf Secur 11(6):319–325
Yang F, Gao M, Yu J, Song Y, Wang X (2018) Detection of shilling attack based on bayesian model and user embedding. In: 2018 IEEE 30th international conference on tools with artificial intelligence (ICTAI). IEEE, pp 639–646
Zhang F, Zhou QJJC (2012) A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems. J Comput 7(1):226–234
Zhang F, Zhou Q (2014) HHT–SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl Based Syst 65:96–105
Zhang F, Deng Z-J, He Z-M, Lin X-C, Sun L-L (2018a) Detection of shilling attack in collaborative filtering recommender system by PCA and data complexity. In: 2018 international conference on machine learning and cybernetics (ICMLC). IEEE, pp 673–678
Zhang F, Zhang Z, Zhang P, Wang S (2018b) Ud-hmm: an unsupervised method for shilling attack detection based on hidden markov model and hierarchical clustering. Knowl Based Syst 148:146–166
Zhou Q (2016) Supervised approach for detecting average over popular items attack in collaborative recommender systems. IET Inf Secur 10(3):134–141
Zhou Q, Zhang F (2012) A hybrid unsupervised approach for detecting profile injection attacks in collaborative recommender systems. J Comput 9(3):687–694
Zhou W, Koh YS, Wen J, Alam S, Dobbie G (2014) Detection of abnormal profiles on group attacks in recommender systems. In: Proceedings of the 37th international ACM SIGIR conference on research & development in information retrieval. ACM, pp 955–958
Zhou W, Wen J, Koh YS, Xiong Q, Gao M, Dobbie G, Alam S (2015) Shilling attacks detection in recommender systems based on target item analysis. PloS one 10(7):e0130968
Zhou W, Wen J, Xiong Q, Gao M, Zeng JJN (2016) SVM-TIA a shilling attack detection method based on svm and target item analysis in recommender systems. Neurocomputing 210:197–205
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rezaimehr, F., Dadkhah, C. A survey of attack detection approaches in collaborative filtering recommender systems. Artif Intell Rev 54, 2011–2066 (2021). https://doi.org/10.1007/s10462-020-09898-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10462-020-09898-3