Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems and their reliance on user-specified judgments for building profiles. Attackers can easily introduce biased data in an attempt to force the system to “adapt” in a manner advantageous to them. Our research in secure personalization is examining a range of attack models, from the simple to the complex, and a variety of recommendation techniques. In this chapter, we explore an attack model that focuses on a subset of users with similar tastes and show that such an attack can be highly successful against both user-based and item-based collaborative filtering. We also introduce a detection model that can significantly decrease the impact of this attack.
KeywordsRecommender System Target Item Recommendation Algorithm Attack Model Average Attack
Unable to display preview. Download preview PDF.
- 1.Burke, R., Mobasher, B., Zabicki, R., Bhaumik, R.: Identifying attack models for secure recommendation. In: Beyond Personalization: A Workshop on the Next Generation of Recommender Systems, San Diego, California (2005)Google Scholar
- 2.Burke, R., Mobasher, B., Bhaumik, R.: Limited knowledge shilling attacks in collaborative filtering systems. In: Proceedings of the 3rd IJCAI Workshop in Intelligent Techniques for Personalization, Edinburgh, Scotland (2005)Google Scholar
- 3.Lam, S., Reidl, J.: Shilling recommender systems for fun and profit. In: Proceedings of the 13th International WWW Conference, New York (2004)Google Scholar
- 5.Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th International World Wide Web Conference, Hong Kong (2001)Google Scholar
- 7.Su, X.F., Zeng, H.J., Chen, Z.: Finding group shilling in recommendation system. In: Proceedings of the 14th international World Wide Web Conference, WWW 2005 (2005)Google Scholar
- 8.OMahony, M., Hurley, N., Silvestre, G.: Utility-based neighbourhood formation for efficient and robust collaborative filtering. In: Proceedings of the 5th ACM Conference on Electronic Commerce (EC 2004), pp. 260–261 (2004)Google Scholar
- 9.Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Effective attack models for shilling item-based collaborative filtering systems. In: Proceedings of the 2005 WebKDD Workshop, held in conjuction with ACM SIGKDD 2005, Chicago, Illinois (2005)Google Scholar
- 10.Herlocker, J., Konstan, J., Borchers, A., Riedl, J.: An algorithmic frame work for performing collaborative filtering. In: Proceedings of the 22nd ACM Conference on Research and Development in Information Retrieval (SIGIR 1999), Berkeley, CA (1999)Google Scholar