ABSTRACT
Collaborative Filtering systems are essentially social systems which base their recommendation on the judgment of a large number of people. However, like other social systems, they are also vulnerable to manipulation by malicious social elements. Lies and Propaganda may be spread by a malicious user who may have an interest in promoting an item, or downplaying the popularity of another one. By doing this systematically, with either multiple identities, or by involving more people, a few malicious user votes and profiles can be injected into a collaborative recommender system. This can significantly affect the robustness of a system or algorithm, as has been studied in recent work [5, 7]. While current detection algorithms are able to use certain characteristics of spam profiles to detect them, they suffer from low precision, and require a large amount of training data. In this work, we provide a simple unsupervised algorithm, which exploits statistical properties of effective spam profiles to provide a highly accurate and fast algorithm for detecting spam.
- Robin Burke, Bamshad Mobasher, Chad Williams, and Runa Bhaumik. Analysis and detection of segment-focused attacks against collaborative recommendation. 2006.Google Scholar
- Paul-Alexandru Chirita, Wolfgang Nejdl, and Cristian Zamfir. Preventing shilling attacks in online recommender systems. In WIDM '05: Proceedings of the 7th annual ACM international workshop on Web information and data management, pages 67--74, New York, NY, USA, 2005. ACM Press. Google ScholarDigital Library
- T. Hastie, R. Tibshirani, A. Eisen, R. Levy, L. Staudt, D. Chan, and P. Brown. Gene shaving as a method for identifying distinct sets of genes with similar expression patterns, 2000.Google Scholar
- I. T. Jolliffe. Principal Component Analysis (2nd Edition). Springer, 2002.Google Scholar
- Shyong K. Lam and John Riedl. Shilling recommender systems for fun and profit. In WWW '04: Proceedings of the 13th international conference on World Wide Web, pages 393--402, New York, NY, USA, 2004. ACM Press. Google ScholarDigital Library
- Bamshad Mobasher, Robin Burke, Chad Williams, and Runa Bhaumik. Classification features for attack detection in collaborative recommender systems. volume TBD, 2006.Google Scholar
- Michael O'Mahony, Neil Hurley, Nicholas Kushmerick, and Guenole; Silvestre. Collaborative recommendation: A robustness analysis. ACM Trans. Inter. Tech., 4(4):344--377, 2004. Google ScholarDigital Library
- Michael P. O'Mahony, Neil J. Hurley, and Silvestre. Detecting noise in recommender system databases. In Proceedings of the International Conference on Intelligent User Interfaces (IUI'06), 29th--1st, pages 109--115, Sydney, Australia, Jan 2006. ACM Press. Google ScholarDigital Library
- Badrul M. Sarwar, George Karypis, Joseph A. Konstan, and John Riedl. Item-based collaborative filtering recommendation algorithms. In WWW, pages 285--295, 2001. Google ScholarDigital Library
- Chad Williams, Bamshad Mobasher, Robin Burke, Jeff Sandvig, and Runa Bhaumik. Detection of obfuscated attacks in collaborative recommender systems. 2006.Google Scholar
Index Terms
- Lies and propaganda: detecting spam users in collaborative filtering
Recommendations
UNIK: unsupervised social network spam detection
CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge ManagementSocial network spam increases explosively with the rapid development and wide usage of various social networks on the Internet. To timely detect spam in large social network sites, it is desirable to discover unsupervised schemes that can save the ...
Poster: CUD: crowdsourcing for URL spam detection
CCS '11: Proceedings of the 18th ACM conference on Computer and communications securityThe prevalence of spam URLs in Internet services, such as email, social networks, blogs and online forums has become a serious problem. These spam URLs host spam advertisements, phishing attempts, and malwares, which are harmful for normal users. ...
A hybrid recommendation method with reduced data for large-scale application
Most recommendation algorithms attempt to alleviate information overload by identifying which items a user will find worthwhile. Content-based (CB) filtering uses the features of items, whereas collaborative filtering (CF) relies on the opinions of ...
Comments