Reference Hub3
The Performance of Location Aware Shilling Attacks in Web Service Recommendation

The Performance of Location Aware Shilling Attacks in Web Service Recommendation

Min Gao, Xiang Li, Wenge Rong, Junhao Wen, Qingyu Xiong
Copyright: © 2017 |Volume: 14 |Issue: 3 |Pages: 14
ISSN: 1545-7362|EISSN: 1546-5004|EISBN13: 9781522511137|DOI: 10.4018/IJWSR.2017070104
Cite Article Cite Article

MLA

Gao, Min, et al. "The Performance of Location Aware Shilling Attacks in Web Service Recommendation." IJWSR vol.14, no.3 2017: pp.53-66. http://doi.org/10.4018/IJWSR.2017070104

APA

Gao, M., Li, X., Rong, W., Wen, J., & Xiong, Q. (2017). The Performance of Location Aware Shilling Attacks in Web Service Recommendation. International Journal of Web Services Research (IJWSR), 14(3), 53-66. http://doi.org/10.4018/IJWSR.2017070104

Chicago

Gao, Min, et al. "The Performance of Location Aware Shilling Attacks in Web Service Recommendation," International Journal of Web Services Research (IJWSR) 14, no.3: 53-66. http://doi.org/10.4018/IJWSR.2017070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The location aware collaborative filtering (LACF) is one of the most successful technique of predicting the Quality of Service (QoS) in Internet of Things (IoT) service recommendation systems. However, the openness of CF web service recommendation renders them vulnerable to the injection of attack profiles consisting of apocryphal QoS values (also identified as shilling attacks). Combined with location factors, such profiles might exert greater impact on the LACF compared with traditional CF method. Unfortunately, to the best of the authors' knowledge, there is few research on such kind of attack model in the literature. Therefore, in this paper, the authors first construct three kinds of attack models including LAA, LAB, and LAR (location aware - average, bandwagon, and random) models and compare the impact of the classical shilling attacks (CSA) and location aware shilling attacks (LASA) on LACF. Furthermore, the authors use two attack detectors to compare the robustness of CSA and LASA. The experimental results on WS-DREAM dataset indicate that the LACF indeed suffers from CSA and LASA. Besides, in comparison with CSA, the LASA models do not always exert more influence on the LACF and the profiles injected by LASA are easier to be detected.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.