Abstract
The robustness of recommender systems has drawn recently more and more attention of both industry and academia. Although a multitude of studies have been devoted to shilling attack modeling and detection, few of them focus on group shilling attack. The attackers in a shilling group work together to manipulate the output of the recommender system. Meanwhile, since the rating profiles in a shilling group are carefully designed, it is hard to detect them by traditional methods. This paper presents a generative model to create shilling group in which every pair of attackers has high diversity. In particular, both strict and loose versions of group shilling attack generation algorithm are proposed. Experimental results on MovieLens data set demonstrate that the shilling group generated by the our model can not only exert large negative effect to recommender systems, but also avoid the detection by the traditional methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lam, S., Riedl, J.: Shilling recommender systems for fun and profit. In: Proceedings of the 13th International Conference on World Wide Web (WWW 2004), pp. 393–402 (2004)
O’Mahony, M., Hurley, N., Kushmerick, N., Silvestre, G.: Collaborative recommendation: A robustness analysis. Transactions on Internet Technology (TOIT) 4(4), 344–377 (2004)
Williams, C.: Profile injection attack detection for securing collaborative recommender systems. Technical report, DePaul University (2006)
Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. Transactions on Internet Technology (TOIT) 7(4), 1–40 (2007)
Chiang, M., Peng, W., Yu, P.: Exploring latent browsing graph for question answering recommendation. World Wide Web: Internet and Web Information Systems, WWWJ (2011)
Zhang, S., Chakrabarti, A., Ford, J., Makedon, F.: Attack detection in time series for recommender systems. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006 (2006)
Chirita, P., Nejdl, W., Zamfir, C.: Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th Annual ACM International Workshop on Web Information and Data Management (WIDM 2005), pp. 67–74 (2005)
Burke, R., Mobasher, B., et al.: Classification features for attack detection in collaborative recommendation systems. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2006 (2006)
Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Modeling and User-Adapted Interaction 19(1-2), 65–97 (2009)
Lee, J., Zhu, D.: Shilling attack detection—a new approach for a trustworthy recommender system. INFORMS Journal on Computing 24(1) (2011)
Wu, Z., Wu, J., Cao, J., Tao, D.: HySAD: A semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data mining (KDD 2012), pp. 985–993 (2012)
Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web: Internet and Web Information Systems (WWWJ) (2012)
Su, X., Zeng, H.J., Chen, Z.: Finding group shilling in recommendation system. In: Proceedings of the 14th International Conference on World Wide Web, WWW 2005 (2005)
Cheng, Z., Hurley, N.: Effective diverse and obfuscated attacks on model-based recommender systems. In: Proceedings of ACM Conference on Recommender Systems (RecSys 2009), pp. 141–148 (2009)
Rashid, A.M., Karypis, G., Riedl, J.: Influence in ratings-based recommender systems: An algorithm-independent approach. In: Proceedings of SIAM International Conference on Data Mining, SIAM 2005 (2005)
Herlocker, J., Konstan, J., Terveen, L., Riedl, J.: Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems (TOIS) 22(1), 5–53 (2004)
Mobasher, B., Burke, R., Williams, C., Bhaumik, R.: Analysis and detection of segment-focused attacks against collaborative recommendation. In: WebKDD Workshop (2006)
Hurley, N., Cheng, Z., Zhang, M.: Statistical attack detection. In: Proceedings of ACM Conference on Recommender Systems, RecSys 2009 (2009)
Wu, Z., Cao, J., Mao, B., Wang, Y.: SemiSAD: Applying semi-supervised learning to shilling attack detection. In: Proceedings of ACM Conference on Recommender Systems (RecSys 2011), Chicago, IL, USA, pp. 289–292 (2011)
Mukherjee, A., Liu, B., Glance, N.S.: Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21th International Conference on World Wide Web (WWW 2012), pp. 191–200 (2012)
Mukherjee, A., Liu, B., Wang, J., Glance, N.S., Jindal, N.: Detecting group review spam. In: Proceedings of the 20th International Conference on World Wide Web WWW 2011 (Companion Volume), pp. 93–94 (2011)
Leung, C., Chan, S., Chung, F., Ngai, G.: A probabilistic rating inference framework for mining user preferences from reviews. World Wide Web: Internet and Web Information Systems (WWWJ) 14(2), 187–215 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, Y., Wu, Z., Cao, J., Fang, C. (2012). Towards a Tricksy Group Shilling Attack Model against Recommender Systems. In: Zhou, S., Zhang, S., Karypis, G. (eds) Advanced Data Mining and Applications. ADMA 2012. Lecture Notes in Computer Science(), vol 7713. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35527-1_56
Download citation
DOI: https://doi.org/10.1007/978-3-642-35527-1_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35526-4
Online ISBN: 978-3-642-35527-1
eBook Packages: Computer ScienceComputer Science (R0)