Abstract
Shilling Attack is where, deceptive users insert fake profiles in recommender system to bias the rating, which is termed as shilling attack. Several studies were conducted in past decade to scrutinize different shilling attacks strategies and their countermeasures mainly categorized in linear algebra, statistical, and classification approach. This paper explores two different methods for shilling attack detection namely, Principal Component Analysis (PCA) and Support Vector Machine (SVM) and compares their performance on attack detection. We had experimented with simulating various attack models like average, random, and bandwagon models. This paper further discusses the importance of detecting malicious profile from the genuine one and suggests deep insights of developing new and more efficient shilling attack detection techniques. The experiments were conducted on the Movie Lens 100 K Dataset and compared the performance of PCA technique with supervised SVM-classification method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Classification features for attack detection in collaborative recommender systems. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 542–547 (2006)
Lam, S., Riedl, J.: Shilling recommender systems for fun and profit. In: ACM Proceedings of the 13th International Conference on World Wide Web, pp. 393–402 (2004)
Zhou, W., Wen, J., Koh, Y., Xiong, Q., Gao, M., Dobbie, G.: Shilling attacks detection in recommender systems based on target item analysis. PLoS ONE 10(7), e0130968 (2015)
Mobasher, B., Burke, R., Bhaumikr, R., Williams, C.: Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans Internet Technol 23–60 (2007)
Mehta, B., Hofmann, T., Fankhauser, P.: Lies and propaganda: detecting spam users in collaborative filtering. In: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 14–21 (2007)
Horng, S.-J., Su, M.-Y., Chen, Y.-H., Kao, T.W., Chen, R.-J., Lai, J.-L.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Elsevier Expert Syst. Appl. 38, 306–313 (2011)
Williams, C.A., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. Serv. Oriented Comput. Appl. 1(3), 157–170 (2007)
Burke, R., Mobasher, R., Williams, C., Bhaumik, R.: Detecting profile injection attacks in collaborative recommender systems. In: The 8th IEEE International Conference on E-Commerce Technology and the 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, pp. 23–30 (2006)
Chirita, P.-A., Nejdl, Zamfir, Z.C.: Preventing shilling attacks in online recommender systems. In: ACM International workshop on web information and data management, pp. 67–74 (2005)
Aggarwal, C.C.: Recommender systems-the textbook. In: ACM SIGMOD-SIGACT-SIGART symposium, pp. 1–493 (2016)
Mehta, B.: Unsupervised shilling detection for collaborative filtering. In: Association for the Advancement of Artificial (2007)
Deng, Z.-J., Zhang, Z., Wang, S.P.S.: Shilling attack detection in collaborative filtering recommender system by PCA detection and perturbation. In: International Conference on Wavelet Analysis and Pattern Recognition (2016)
Gayathri, K., Marimuthu, A.: Text document preprocessing with the KNN for classification using the SVM. In: International Conference on Intelligent Systems and Control (2013)
Al-Anazi, A.F., Gates, I.D.: Support vector regression for porosity prediction. Elsevier Comput. Geosci. 36, 1494–1503 (2010)
Belen, M.-B., Rosa, L., Juan, R.: Interpretable support vector machines for functional data. In: European Journal of Operational Research (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Samaiya, N., Raghuwanshi, S.K., Pateriya, R.K. (2019). Shilling Attack Detection in Recommender System Using PCA and SVM. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 813. Springer, Singapore. https://doi.org/10.1007/978-981-13-1498-8_55
Download citation
DOI: https://doi.org/10.1007/978-981-13-1498-8_55
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1497-1
Online ISBN: 978-981-13-1498-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)