skip to main content
10.1145/2663761.2664232acmconferencesArticle/Chapter ViewAbstractPublication PagesracsConference Proceedingsconference-collections
research-article

Unsupervised detection of obfuscated diverse attacks in recommender systems

Published:05 October 2014Publication History

ABSTRACT

Biased ratings of attack profiles have a significant impact on the effectiveness of collaborative recommender systems. Previous work has shown standard memory-based recommendation algorithms, such as k-nearest neighbor (kNN), susceptible to the attacks compared with model-based collaborative filtering (CF) algorithms. An obfuscated diverse attack strategy made model-based algorithms vulnerable to attacks. Attack profiles generated with this strategy are also able to avoid principal component analysis (PCA)-based detection. This paper proposes an algorithm to detect obfuscated diverse attack profiles. Profiles' pairwise covariance with each other is used to separate attack profiles from genuine profiles. Through extensive experiments, we demonstrate that our algorithm detects these attack profiles with high accuracy.

References

  1. M. O. K. Bryan and P. Cunningham. Unsupervised retrieval of attack profiles in collaborative recommender systems. In Technical Report, University College Dublin, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Z. Cheng, N. Hurley. Effective diverse and obfuscated attacks on model-based recommender systems. In Proceedings of the 2009 ACM Conference on Recommender Systems, RecSys 2009, pp. 141--148. ACM, October 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Herlocker, J. Konstan, A. Borchers, and J. Riedl. An algorithmic framework for performing collaborative filtering. In Proceedings of the 22nd ACM Conference on Research and Development in Information Retrieval (SIGIR'99), pp. 230--237. August 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. N. Hurley, Z. Cheng, and M. Zhang. Statistical attack detection. In Proceedings of the 2009 ACM Conference on Recommender Systems, RecSys 2009, pp. 149--156. ACM, October 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Y. Koren. Factorization meets the neighborhood: a multi-faceted collaborative filtering model. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '08), pp. 426--434, August 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. T. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In Proceedings of the 13th international conference on World Wide Web, WWW 2004, pp. 393--402. ACM, May 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Mehta and W. Nejdl. Unsupervised strategies for shilling detection and robust collaborative filtering. User Modeling and User-Adapted Interaction, 19(1--2):65--97, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. B. Mehta, T. Hofmann, and P. Fankhauser. Lies and propaganda: detecting spam users in collaborative filtering. In Proceedings of the 2007 International Conference on Intelligent User Interfaces, pp. 14--21. ACM, January 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Mehta. Unsupervised shilling detection for collaborative filtering. In Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, pp. 1402--1407. AAAI, July 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Towards trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 7(2): 1--40, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Mobasher, R. Burke, C. Williams, and R. Bhaumik. Analysis and detection of segment-focused attacks against collaborative recommendation. Lecture Notes in Computer Science: Proceedings of the 2005 WebKDD Workshop, pp. 96--118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Mobasher, R. Burke, and J. Sandvig. Model-based collaborative filtering as a defense against profile injection attacks. In Proceedings of the 21st National Conference on Artificial Intelligence and the 18th Innovative Applications of Artificial Intelligence Conference, pp. 1388--1393. AAAI, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. O'Mahony, N. Hurley, N. Kushmerick, and G. Silvestre. Collaborative recommendation: A robustness analysis. ACM Transactions on Internet Technology, 4(4):344--377, November 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Salakhutdinov and A. Mnih. Probabilistic Matrix Factorization. Advances in Neural Information Processing Systems 20 (NIPS 07), pp. 1257--1264. ACM Press, 2008.Google ScholarGoogle Scholar
  15. C. Williams, B. Mobasher, R. Burke, R. Bhaumik, and J. Sandvig. Detection of obfuscated attacks in collaborative recommender systems. In Proceedings of the 17th European Conference on Artificial Intelligence (ECAI'06), pp. 19--23, August 2006.Google ScholarGoogle Scholar

Index Terms

  1. Unsupervised detection of obfuscated diverse attacks in recommender systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      RACS '14: Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems
      October 2014
      386 pages
      ISBN:9781450330602
      DOI:10.1145/2663761

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 October 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      RACS '14 Paper Acceptance Rate59of251submissions,24%Overall Acceptance Rate393of1,581submissions,25%
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader