An Approach to Discover Malicious Online Users in Collaborative Systems

  • Ossama EmbarakEmail author
  • Maryam Khaleifah
  • Alya Ali
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 29)


Collaborative filtering systems employ numerous techniques to provide recommendations for online users. These techniques depend on the collected data about online users’ preferences or ratings of provided items, topics, news, etc. Such systems are vulnerable to malicious users’ attacks in which malicious users carefully target specific profiles in order to boost up or diminish the predictions of some targeted items. In this paper, we suggested an approach to find malicious attacks and remove attackers’ profiles. This leads to placing the user ratings in the region of rejection and thereby affecting his level of trustiness, the impact of specific user ratings is affected by the user calculated trustiness level, where completely untrusted user’s ratings will be neglected by recommendation system. We used a Movie Lens of 1 M rating dataset to perform the required training and test the suggested framework. The suggested method distinguished perfectly between Normal, Excess, Inferiority, and completely dishonest users.


  1. 1.
    Burke, R., O’Mahony, M.P., Hurley, N.J.: Robust collaborative recommendation. In: Recommender Systems Handbook, pp. 961–995. Springer, Boston (2015)CrossRefGoogle Scholar
  2. 2.
    Yang, L., Huang, W., Niu, X.: Defending shilling attacks in recommender systems using soft co-clustering. IET Inf. Secur. 11(6), 319–325 (2017)CrossRefGoogle Scholar
  3. 3.
    Embarak, O.H., Corne, D.W.: Detecting vicious users in recommendation systems. In: Developments in E-systems Engineering (DeSE), pp. 339–344. IEEE, December 2011Google Scholar
  4. 4.
    Panagopoulos, A., Koutrouli, E., Tsalgatidou, A.: Modeling and evaluating a robust feedback-based reputation system for e-commerce platforms. ACM Trans. Web (TWEB) 11(3), 18 (2017)Google Scholar
  5. 5.
    Ricci, F., Rokach, L., Shapira, B.: Recommender systems: introduction and challenges. In: Recommender Systems Handbook, pp. 1–34. Springer, Boston (2015)CrossRefGoogle Scholar
  6. 6.
    Wang, S., Zheng, Z., Wu, Z., Lyu, M.R., Yang, F.: Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Trans. Serv. Comput. 8(5), 755–767 (2015)CrossRefGoogle Scholar
  7. 7.
    Moradi, P., Ahmadian, S.: A reliability-based recommendation method to improve trust-aware recommender systems. Expert Syst. Appl. 42(21), 7386–7398 (2015)CrossRefGoogle Scholar
  8. 8.
    Gunes, I., Kaleli, C., Bilge, A., Polat, H.: Shilling attacks against recommender systems: a comprehensive survey. Artif. Intell. Rev. 42(4), 767–799 (2014)CrossRefGoogle Scholar
  9. 9.
    Aggarwal, C.C.: Recommender Systems, pp. 1–28. Springer International Publishing, Cham (2016)Google Scholar
  10. 10.
    Zhou, W., Wen, J., Koh, Y.S., Xiong, Q., Gao, M., Dobbie, G., Alam, S.: Shilling attacks detection in recommender systems based on target item analysis. PLoS ONE 10(7), e0130968 (2015)CrossRefGoogle Scholar
  11. 11.
    Harper, F.M., Konstan, J.A.: The movielens datasets: History and context. ACM Trans. Interact. Intell. Syst. (TIIS) 5(4), 19 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer SciencesHigher Colleges of TechnologyFujairahUAE

Personalised recommendations