Skip to main content

A Shilling Attack Detection Method Based on SVM and Target Item Analysis in Collaborative Filtering Recommender Systems

  • Conference paper
  • First Online:
Knowledge Science, Engineering and Management (KSEM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9403))

Abstract

The open nature of recommender systems makes them vulnerable to shilling attacks. Biased ratings are introduced in order to affect recommendations, have been shown to cause great harm to collaborative filtering algorithms. Most of previous research focuses on the differences between genuine profiles and attack profiles, ignoring the group characteristics in an attack. There exists class unbalance problems in SVM based detecting methods, that is, the detecting performance is not good when the amount of samples of attack profiles in training set is small. In this paper, we study the use of SVM based method and group characteristics in attack profiles to detect attack profiles. Based on this, a two phase detecting method SVM-TIA is proposed. In the first phase, Borderline-SMOTE method is used to alleviate the class unbalance problem in classification; a rough detecting result is obtained in this phase; the second phase is a fine-tuning phase whereby the target items in the potential attack profiles set are analysed. We conduct experiments on the MovieLens 100K Dataset and compare the performance of SVM-TIA with other shilling detecting methods to demonstrate the effectiveness of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Classification features for attack detection in collaborative recommender systems. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 542–547. ACM (2006)

    Google Scholar 

  2. Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: Proceedings of the 13th International Conference on World Wide Web, pp. 393–402. ACM (2004)

    Google Scholar 

  3. Cheng, Z., Hurley, N.: Effective diverse and obfuscated attacks on model-based recommender systems. In: Proceedings of the third ACM Conference on Recommender systems, pp. 141–148. ACM (2009)

    Google Scholar 

  4. Mehta, B., Hofmann, T., Nejdl, W.: Robust collaborative filtering. In: Proceedings of the 2007 ACM Conference on Recommender systems, pp. 49–56. ACM (2007)

    Google Scholar 

  5. Mehta, B., Nejdl, W.: Attack resistant collaborative filtering. In: Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 75–82. ACM (2008)

    Google Scholar 

  6. Burke, R., Mobasher, B., Bhaumik, R., Williams, C.: Segment-based injection attacks against collaborative filtering recommender systems. In: Fifth IEEE International Conference on Data Mining, p. 4. IEEE (2005)

    Google Scholar 

  7. Carrer-Neto, W., Hernández-Alcaraz, M.L., Valencia-García, R., García-Sánchez, F.: Social knowledge-based recommender system. application to the movies domain. Expert Systems with Applications 39(12), 10990–11000 (2012)

    Article  Google Scholar 

  8. Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Detecting profile injection attacks in collaborative recommender systems. In: The 8th IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, pp. 23–23. IEEE (2006)

    Google Scholar 

  9. Williams, C.A., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. Service Oriented Computing and Applications 1(3), 157–170 (2007)

    Article  Google Scholar 

  10. Zhang, F., Zhou, Q.: Hht-svm: An online method for detecting profile injection attacks in collaborative recommender systems. Knowledge-Based Systems 65, 96–105 (2014)

    Article  Google Scholar 

  11. Hurley, N., Cheng, Z., Zhang, M.: Statistical attack detection. In: Proceedings of the Third ACM Conference on Recommender Systems, pp. 149–156. ACM (2009)

    Google Scholar 

  12. Fu, L., Goh, D.H.-L., Foo, S.S.-B., Na, J.-C.: Collaborative querying through a hybrid query clustering approach. In: Sembok, T.M.T., Zaman, H.B., Chen, H., Urs, S.R., Myaeng, S.-H. (eds.) ICADL 2003. LNCS, vol. 2911, pp. 111–122. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Zhang, S., Chakrabarti, A., Ford, J., Makedon, F.: Attack detection in time series for recommender systems. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 809–814. ACM (2006)

    Google Scholar 

  14. Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Modeling and User-Adapted Interaction 19(1–2), 65–97 (2009)

    Article  Google Scholar 

  15. Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6), 729–748 (2013)

    Article  Google Scholar 

  16. Wu, Z., Wu, J., Cao, J., Tao, D.: Hysad: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985–993. ACM (2012)

    Google Scholar 

  17. Horng, S.-J., Su, M.-Y., Chen, Y.-H., Kao, T.-W., Chen, R.-J., Lai, J.-L., Perkasa, C.D.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Systems with Applications 38(1), 306–313 (2011)

    Article  Google Scholar 

  18. Ch, S., Sohani, S., Kumar, D., Malik, A., Chahar, B., Nema, A., Panigrahi, B.K., Dhiman, R.: A support vector machine-firefly algorithm based forecasting model to determine malaria transmission. Neurocomputing 129, 279–288 (2014)

    Article  Google Scholar 

  19. Zhang, H., Berg, A.C., Maire, M., Malik, J.: Svm-knn: Discriminative nearest neighbor classification for visual category recognition. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2, pp. 2126–2136. IEEE (2006)

    Google Scholar 

  20. Zhang, F., Wang, B.: Approach of detecting user profile attacks based on svm and Rough set theory. Journal of Chinese Computer Systems 35(1), 108–113 (2014)

    Google Scholar 

  21. Lv, S., Wang, W.: A shilling attacks detection method of recommender systems based on hybrid strategies. Computer Engineering & Science 35(8), 174–179 (2013)

    Google Scholar 

  22. Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. Journal of Artificial Intelligence Research 16(1), 321–357 (2002)

    Article  MATH  Google Scholar 

  23. Han, H., Wang, W.-Y., Mao, B.-H.: Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In: Huang, D.-S., Huang, G.-B., Zhang, X.-P. (eds.) ICIC 2005. LNCS, vol. 3644, pp. 878–887. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  24. Zhou, W., Koh, Y.S., Wen, J., Alam, S., Dobbie, G.: Detection of abnormal profiles on group attacks in recommender systems. In: Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, pp. 955–958. ACM (2014)

    Google Scholar 

  25. Zhou, W., Wen, J., Koh, Y.S., Alam, S., Dobbie, G.: Attack detection in recommender systems based on target item analysis. In: 2014 International Joint Conference on Neural Networks (IJCNN), pp. 332–339. IEEE (2014)

    Google Scholar 

  26. Chang, C.-C., Lin, C.-J.: Libsvm: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST) 2(3), 27 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junhao Wen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhou, W., Wen, J., Gao, M., Liu, L., Cai, H., Wang, X. (2015). A Shilling Attack Detection Method Based on SVM and Target Item Analysis in Collaborative Filtering Recommender Systems. In: Zhang, S., Wirsing, M., Zhang, Z. (eds) Knowledge Science, Engineering and Management. KSEM 2015. Lecture Notes in Computer Science(), vol 9403. Springer, Cham. https://doi.org/10.1007/978-3-319-25159-2_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25159-2_69

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25158-5

  • Online ISBN: 978-3-319-25159-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics