Advertisement

SOFIA: Social Filtering for Robust Recommendations

  • Matteo Dell'Amico
  • Licia Capra
Part of the IFIP – The International Federation for Information Processing book series (IFIPAICT, volume 263)

Digital content production and distribution has radically changed our business models. An unprecedented volume of supply is now on offer, whetted by the demand of millions of users from all over the world. Since users cannot be expected to browse through millions of different items to find what they might like, filtering has become a popular technique to connect supply and demand: trusted users are first identified, and their opinions are then used to create recommendations. In this domain, users’ trustworthiness has been measured according to one of the following two criteria: taste similarity (i.e., “I trust those who agree with me”), or social ties (i.e., “I trust my friends, and the people that my friends trust”). The former criterion aims at identifying competent users, but is subject to abuse by malicious behaviours. The latter aims at detecting well-intentioned users, but fails to capture the natural subjectivity of tastes. We argue that, in order to be trusted, users must be both well-intentioned and competent. Based on this observation, we propose a novel approach that we call social filtering. We describe SOFIA, an algorithm realising this approach, and validate its performance, in terms of accuracy and robustness, on two real large-scale datasets.

Keywords

Recommender System Malicious Node Malicious User Honest Node Competent User 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    C. Anderson. The Long Tail: Why the Future of Business Is Selling Less of More. Hyperion, 2006.Google Scholar
  2. 2.
    R. Burke, B. Mobasher, R. Bhaumik, and C. Williams. Segment-based injection attacks against collaborative filtering recommender systems. In Proc. IEEE ICDM ’05, 2005.Google Scholar
  3. 3.
    J. R. Douceur. The Sybil attack. In Proc. IPTPS ’02, March 2002.Google Scholar
  4. 4.
    M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust incentive techniques for peer-to-peer networks. In Proc. ACM EC ’04, 2004.Google Scholar
  5. 5.
    E. J. Friedman and A. Cheng. Manipulability of pagerank under sybil strategies. In Proc. NetEcon06, 2006.Google Scholar
  6. 6.
    R. V. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In ACM WWW ’04, 2004.Google Scholar
  7. 7.
    J. L. Herlocker, J. A. Konstan, A. Borchers, and J. Riedl. An algorithmic framework for performing collaborative filtering. In Proc. ACM SIGIR ’99, 1999.Google Scholar
  8. 8.
    A. Josang. The right type of trust for distributed systems. Proc. Proc. ACM NSPW ’96, 1996.Google Scholar
  9. 9.
    H. Kautz, B. Selman, and M. Shah. Referral web: combining social networks and collaborative filtering. Commun. ACM, 40(3):63-65, March 1997.CrossRefGoogle Scholar
  10. 10.
    J. M. Kleinberg. Authoritative sources in a hyperlinked environment. JACM, 46, 1999.Google Scholar
  11. 11.
    S. Lam, D. Frankowski, and J. Riedl. Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems. In Proc. ETRICS ’06, 2006.Google Scholar
  12. 12.
    M. Langheinrich. When trust does not compute - the role of trust in ubiquitous computing. Workshop on Privacy at Ubicomp 2003, October 2003.Google Scholar
  13. 13.
    R. Lempel and S. Moran. Salsa: the stochastic approach for link-structure analysis. ACM Trans. Inf. Syst., 19(2):131-160, April 2001.CrossRefGoogle Scholar
  14. 14.
    P. Massa and P. Avesani. Trust-aware recommender systems. In Proc. ACM RecSys ’07, 2007.Google Scholar
  15. 15.
    B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM TOIT, 7(4):23, 2007.Google Scholar
  16. 16.
    B. Mobasher, R. Burke, and J. J. Sandvig. Model-based collaborative filtering as a defense against profile injection attacks. In Proc. AAAI’06, 2006.Google Scholar
  17. 17.
    M. A. Nowak and K. Sigmund. Evolution of indirect reciprocity by image scoring. Nature, 393(6685):573-577, 1998.CrossRefGoogle Scholar
  18. 18.
    M. O’Mahony, N. Hurley, and G. Silvestre. Promoting Recommendations: An Attack on Collaborative Filtering. In Database and Expert Systems Applications. Springer, 2002.Google Scholar
  19. 19.
    L. Page, S. Brin, R. Motwani and T. Winograd. The PageRank Citation Ranking: Bringing Order to the Web. Digital Libraries Project 1999-66, Stanford University, 1999.Google Scholar
  20. 20.
    H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against Sybil attacks via social networks. In ACM SIGCOMM 2006, pages 267-278. ACM, 2006.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Matteo Dell'Amico
    • 1
  • Licia Capra
    • 2
  1. 1.Università di GenovaItaly
  2. 2.Department of Computer ScienceUniversity College LondonUK

Personalised recommendations