Abstract
In social aware network (SAN) paradigm, the fundamental activities concentrate on exploring the behavior and attributes of the users. This investigation of user characteristic aids in the design of highly efficient and suitable protocols. In particular, the shilling attack introduces a high degree of vulnerability into the recommender systems. The shilling attackers use the reviews, user ratings and forged user generated content data for the computation of recommendation rankings. The detection of shilling attack in recommender systems is considered to be essential for sustaining their fairness and reliability. In specific, the collaborative filtering strategies utilized for detecting shilling attackers through efficient user behavior mining are considered as the predominant methodologies in the literature. In this paper, a hybrid convolutional neural network (CNN) and long-short term memory (LSTM)-based deep learning model (CNN–LSTM) is proposed for detecting shilling attack in recommender systems. This deep learning model utilizes the transformed network architecture for exploiting the deep-level attributes derived from user rated profiles. It overcomes the limitations of the existing shilling attack detection methods which mostly focuses on identifying spam users by designing features artificially in order to enhance their efficiency and robustness. It is also potent in elucidating deep-level features for efficiently detecting shilling attacks by accurately elaborating the user ratings. The experimental results confirmed the significance of the proposed CNN–LSTM approach by accurately detecting most of the obfuscated attacks compared to the state-of-art algorithms used for investigation.
Similar content being viewed by others
References
Batmaz Z, Polat H (2017) Designing shilling attacks on disguised binary data. Int J Data Min Model Manag 9(3):185
Batmaz Z, Yilmazel B, Kaleli C (2019) Shilling attack detection in binary data: a classification approach. J Ambient Intell Hum Comput 2(1):23–32
Burke R, Mobasher B, Bhaumik R, Williams C (2005) Segment-based injection attacks against collaborative filtering recommender systems. In: Fifth IEEE international conference on data mining, vol 1, (ICDM’05), pp 45–53
Cai H, Zhang F (2019) Detecting shilling attacks in recommender systems based on analysis of user rating behavior. Knowl Based Syst 177(3):22–43
Cao L (2016) Non-iid recommender systems: a review and framework of recommendation paradigm shifting. Engineering 2(2):212–224
Cao J, Wu Z, Mao B, Zhang Y (2012) Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6):729–748
Chen K, Chan PPK, Zhang F, Li Q (2019) Shilling attack based on item popularity and rated item correlation against collaborative filtering. Int J Mach Learn Cybern 10(7):1833–1845
Deng P, Zhong J et al (2013) Recommendation-based anti-attack trust model on E-commerce. J Comput Appl 33(12):3490–3493
Gunes I, Kaleli C, Bilge A, Polat H et al (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42(4):767–799
Guo L, Liang J, Zhu Y, Luo Y, Sun L, Zheng X (2018) Collaborative filtering recommendation based on trust and emotion. J Intell Inf Syst 53(1):113–135
Hao Y, Zhang F, Wang J, Zhao Q, Cao J (2019) Detecting shilling attacks with automatic features from multiple views. Secur Commun Netw 2019(2):1–13
Ji A, Yeon C, Kim H, Jo G (2007) Distributed collaborative filtering for robust recommendations against shilling attacks. Adv Artif Intell 2(1):14–25
Jiang L, Cheng Y, Yang L, Li J, Yan H, Wang X (2018) A trust-based collaborative filtering algorithm for e-Commerce recommendation system. J Ambient Intell Hum Comput 10(8):3023–3034
Kapoor S, Gupta V, Kumar R (2018) An obfuscated attack detection approach for collaborative recommender systems. J Comput Inf Technol 26(1):45–56
Karthikeyan P, Selvi ST, Neeraja G, Deepika R, Vincent A, Abinaya V (2016) Prevention of shilling attack in recommender systems using discrete wavelet transform and support vector machine. In: Eighth international conference on advanced computing, vol 1, (ICoAC), pp 34–43
Krizhevsky A, Sutskever I, Hinton GE (2017) ImageNet classification with deep convolutional neural networks. Commun ACM 60(6):84–90
Mobasher B, Burke R, Bhaumik R, Sandvig JJ (2007) Attacks and remedies in collaborative recommendation. IEEE Intell Syst 22(3):56–63
Patel K, Thakkar A, Shah C, Makvana K (2016) A state of art survey on shilling attack in collaborative filtering based recommendation system. In: Proceedings of first international conference on information and communication technology for intelligent systems, vol 1, pp 377–385
Tong C, Yin X, Li J, Zhu T, Lv R, Sun L, Rodrigues JJPC (2018) A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. Comput J 61(7):949–958
Wang W, Zhang G, Lu J (2015) Collaborative filtering with entropy-driven user similarity in recommender systems. Int J Intell Syst 30(8):854–870
Xu Y, Zhang F (2019) Detecting shilling attacks in social recommender systems based on time series analysis and trust features. Knowl Based Syst 178(4):25–47
Yang Z, Cai Z (2016) Detecting abnormal profiles in collaborative filtering recommender systems. J Intell Inf Syst 48(3):499–518
Zhang F, Chen H (2015) An ensemble method for detecting shilling attacks based on ordered item sequences. Secur Commun Netw 9(7):680–696
Zhang F, Zhou Q (2012) A meta-learning-based approach for detecting profile injection attacks in collaborative recommender systems. J Comput 7(1):67–74
Zhang F, Zhou Q (2015) Ensemble detection model for profile injection attacks in collaborative recommender systems based on BP neural network. IET Inf Secur 9(1):24–31
Zhang Z, Kulkarni SR et al (2013) Graph-based detection of shilling attacks in recommender systems. In: IEEE International workshop on machine learning for signal processing, vol 2, pp 12–18
Zhang Q, Wang J, Huang H, Huang X, Gong Y (2017) Hashtag recommendation for multimodal microblog using co-attention network. In: Proceedings of the twenty-sixth international joint conference on artificial intelligence, vol 2, pp 56–63
Zhou W, Wen J, Koh YS, Xiong Q, Gao M, Dobbie G, Alam S (2015) Shilling attacks detection in recommender systems based on target item analysis. PLoS One 10(7):e0130968–e0130968
Zhou W, Wen J, Qu Q, Zeng J, Cheng T (2018) Shilling attack detection for recommender systems based on credibility of group users and rating time series. PLoS One 13(5):e0196533–e0196533
Zhu L (2018) A novel social network measurement and perception pattern based on a multi-agent and convolutional neural network. Comput Electr Eng 66(2):229–245
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Vivekanandan, K., Praveena, N. Hybrid convolutional neural network (CNN) and long-short term memory (LSTM) based deep learning model for detecting shilling attack in the social-aware network. J Ambient Intell Human Comput 12, 1197–1210 (2021). https://doi.org/10.1007/s12652-020-02164-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02164-y