Skip to main content

Shilling Attack Detection in Recommender System Using PCA and SVM

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Abstract

Shilling Attack is where, deceptive users insert fake profiles in recommender system to bias the rating, which is termed as shilling attack. Several studies were conducted in past decade to scrutinize different shilling attacks strategies and their countermeasures mainly categorized in linear algebra, statistical, and classification approach. This paper explores two different methods for shilling attack detection namely, Principal Component Analysis (PCA) and Support Vector Machine (SVM) and compares their performance on attack detection. We had experimented with simulating various attack models like average, random, and bandwagon models. This paper further discusses the importance of detecting malicious profile from the genuine one and suggests deep insights of developing new and more efficient shilling attack detection techniques. The experiments were conducted on the Movie Lens 100 K Dataset and compared the performance of PCA technique with supervised SVM-classification method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Classification features for attack detection in collaborative recommender systems. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 542–547 (2006)

    Google Scholar 

  2. Lam, S., Riedl, J.: Shilling recommender systems for fun and profit. In: ACM Proceedings of the 13th International Conference on World Wide Web, pp. 393–402 (2004)

    Google Scholar 

  3. Zhou, W., Wen, J., Koh, Y., Xiong, Q., Gao, M., Dobbie, G.: Shilling attacks detection in recommender systems based on target item analysis. PLoS ONE 10(7), e0130968 (2015)

    Google Scholar 

  4. Mobasher, B., Burke, R., Bhaumikr, R., Williams, C.: Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans Internet Technol 23–60 (2007)

    Google Scholar 

  5. Mehta, B., Hofmann, T., Fankhauser, P.: Lies and propaganda: detecting spam users in collaborative filtering. In: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 14–21 (2007)

    Google Scholar 

  6. Horng, S.-J., Su, M.-Y., Chen, Y.-H., Kao, T.W., Chen, R.-J., Lai, J.-L.: A novel intrusion detection system based on hierarchical clustering and support vector machines. Elsevier Expert Syst. Appl. 38, 306–313 (2011)

    Google Scholar 

  7. Williams, C.A., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. Serv. Oriented Comput. Appl. 1(3), 157–170 (2007)

    Google Scholar 

  8. Burke, R., Mobasher, R., Williams, C., Bhaumik, R.: Detecting profile injection attacks in collaborative recommender systems. In: The 8th IEEE International Conference on E-Commerce Technology and the 3rd IEEE International Conference on Enterprise Computing, E-Commerce, and E-Services, pp. 23–30 (2006)

    Google Scholar 

  9. Chirita, P.-A., Nejdl, Zamfir, Z.C.: Preventing shilling attacks in online recommender systems. In: ACM International workshop on web information and data management, pp. 67–74 (2005)

    Google Scholar 

  10. Aggarwal, C.C.: Recommender systems-the textbook. In: ACM SIGMOD-SIGACT-SIGART symposium, pp. 1–493 (2016)

    Google Scholar 

  11. Mehta, B.: Unsupervised shilling detection for collaborative filtering. In: Association for the Advancement of Artificial (2007)

    Google Scholar 

  12. Deng, Z.-J., Zhang, Z., Wang, S.P.S.: Shilling attack detection in collaborative filtering recommender system by PCA detection and perturbation. In: International Conference on Wavelet Analysis and Pattern Recognition (2016)

    Google Scholar 

  13. Gayathri, K., Marimuthu, A.: Text document preprocessing with the KNN for classification using the SVM. In: International Conference on Intelligent Systems and Control (2013)

    Google Scholar 

  14. Al-Anazi, A.F., Gates, I.D.: Support vector regression for porosity prediction. Elsevier Comput. Geosci. 36, 1494–1503 (2010)

    Google Scholar 

  15. Belen, M.-B., Rosa, L., Juan, R.: Interpretable support vector machines for functional data. In: European Journal of Operational Research (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Noopur Samaiya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Samaiya, N., Raghuwanshi, S.K., Pateriya, R.K. (2019). Shilling Attack Detection in Recommender System Using PCA and SVM. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 813. Springer, Singapore. https://doi.org/10.1007/978-981-13-1498-8_55

Download citation

Publish with us

Policies and ethics