skip to main content
10.1145/1216295.1216307acmconferencesArticle/Chapter ViewAbstractPublication PagesiuiConference Proceedingsconference-collections
Article

Lies and propaganda: detecting spam users in collaborative filtering

Published:28 January 2007Publication History

ABSTRACT

Collaborative Filtering systems are essentially social systems which base their recommendation on the judgment of a large number of people. However, like other social systems, they are also vulnerable to manipulation by malicious social elements. Lies and Propaganda may be spread by a malicious user who may have an interest in promoting an item, or downplaying the popularity of another one. By doing this systematically, with either multiple identities, or by involving more people, a few malicious user votes and profiles can be injected into a collaborative recommender system. This can significantly affect the robustness of a system or algorithm, as has been studied in recent work [5, 7]. While current detection algorithms are able to use certain characteristics of spam profiles to detect them, they suffer from low precision, and require a large amount of training data. In this work, we provide a simple unsupervised algorithm, which exploits statistical properties of effective spam profiles to provide a highly accurate and fast algorithm for detecting spam.

References

  1. Robin Burke, Bamshad Mobasher, Chad Williams, and Runa Bhaumik. Analysis and detection of segment-focused attacks against collaborative recommendation. 2006.Google ScholarGoogle Scholar
  2. Paul-Alexandru Chirita, Wolfgang Nejdl, and Cristian Zamfir. Preventing shilling attacks in online recommender systems. In WIDM '05: Proceedings of the 7th annual ACM international workshop on Web information and data management, pages 67--74, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Hastie, R. Tibshirani, A. Eisen, R. Levy, L. Staudt, D. Chan, and P. Brown. Gene shaving as a method for identifying distinct sets of genes with similar expression patterns, 2000.Google ScholarGoogle Scholar
  4. I. T. Jolliffe. Principal Component Analysis (2nd Edition). Springer, 2002.Google ScholarGoogle Scholar
  5. Shyong K. Lam and John Riedl. Shilling recommender systems for fun and profit. In WWW '04: Proceedings of the 13th international conference on World Wide Web, pages 393--402, New York, NY, USA, 2004. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bamshad Mobasher, Robin Burke, Chad Williams, and Runa Bhaumik. Classification features for attack detection in collaborative recommender systems. volume TBD, 2006.Google ScholarGoogle Scholar
  7. Michael O'Mahony, Neil Hurley, Nicholas Kushmerick, and Guenole; Silvestre. Collaborative recommendation: A robustness analysis. ACM Trans. Inter. Tech., 4(4):344--377, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Michael P. O'Mahony, Neil J. Hurley, and Silvestre. Detecting noise in recommender system databases. In Proceedings of the International Conference on Intelligent User Interfaces (IUI'06), 29th--1st, pages 109--115, Sydney, Australia, Jan 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Badrul M. Sarwar, George Karypis, Joseph A. Konstan, and John Riedl. Item-based collaborative filtering recommendation algorithms. In WWW, pages 285--295, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chad Williams, Bamshad Mobasher, Robin Burke, Jeff Sandvig, and Runa Bhaumik. Detection of obfuscated attacks in collaborative recommender systems. 2006.Google ScholarGoogle Scholar

Index Terms

  1. Lies and propaganda: detecting spam users in collaborative filtering

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IUI '07: Proceedings of the 12th international conference on Intelligent user interfaces
          January 2007
          388 pages
          ISBN:1595934812
          DOI:10.1145/1216295

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 January 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate746of2,811submissions,27%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader