Method for Detecting Shilling Attacks Based on Implicit Feedback in Recommender Systems

O. Chala, L. Novikova, L. Chernyshova, Angelika Kalnitskaya
{"title":"Method for Detecting Shilling Attacks Based on Implicit Feedback in Recommender Systems","authors":"O. Chala, L. Novikova, L. Chernyshova, Angelika Kalnitskaya","doi":"10.21303/2461-4262.2020.001394","DOIUrl":null,"url":null,"abstract":"The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in the recommender system, is considered. The purpose of such attacks is to include in the recommended list of items the goods specified by the attacking user. The recommendations obtained as a result of the attack will not correspond to customers' real preferences, which can lead to distrust of the recommender system and a drop in sales. The existing methods for detecting shilling attacks use explicit feedback from the user and are focused primarily on building patterns that describe the key characteristics of the attack. However, such patterns only partially take into account the dynamics of user interests. A method for detecting shilling attacks using implicit feedback is proposed by comparing the temporal description of user selection processes and ratings. Models of such processes are formed using a set of weighted temporal rules that define the relationship in time between the moments when users select a given object. The method uses time-ordered input data. The method includes the stages of forming sets of weighted temporal rules for describing sales processes and creating ratings, calculating a set of ratings for these processes, and forming attack indicators based on a comparison of the ratings obtained. The resulting signs make it possible to distinguish between nuke and push attacks. The method is designed to identify discrepancies in the dynamics of purchases and ratings, even in the absence of rating values at certain time intervals. The technique makes it possible to identify an approach to masking an attack based on a comparison of the rating values and the received attack indicators. When applied iteratively, the method allows to refine the list of profiles of potential attackers. The technique can be used in conjunction with pattern-oriented approaches to identifying shilling attacks","PeriodicalId":252015,"journal":{"name":"CompSciRN: Cyber Attack (Topic)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CompSciRN: Cyber Attack (Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21303/2461-4262.2020.001394","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The problem of identifying shilling attacks, which are aimed at forming false ratings of objects in the recommender system, is considered. The purpose of such attacks is to include in the recommended list of items the goods specified by the attacking user. The recommendations obtained as a result of the attack will not correspond to customers' real preferences, which can lead to distrust of the recommender system and a drop in sales. The existing methods for detecting shilling attacks use explicit feedback from the user and are focused primarily on building patterns that describe the key characteristics of the attack. However, such patterns only partially take into account the dynamics of user interests. A method for detecting shilling attacks using implicit feedback is proposed by comparing the temporal description of user selection processes and ratings. Models of such processes are formed using a set of weighted temporal rules that define the relationship in time between the moments when users select a given object. The method uses time-ordered input data. The method includes the stages of forming sets of weighted temporal rules for describing sales processes and creating ratings, calculating a set of ratings for these processes, and forming attack indicators based on a comparison of the ratings obtained. The resulting signs make it possible to distinguish between nuke and push attacks. The method is designed to identify discrepancies in the dynamics of purchases and ratings, even in the absence of rating values at certain time intervals. The technique makes it possible to identify an approach to masking an attack based on a comparison of the rating values and the received attack indicators. When applied iteratively, the method allows to refine the list of profiles of potential attackers. The technique can be used in conjunction with pattern-oriented approaches to identifying shilling attacks
基于隐式反馈的推荐系统Shilling攻击检测方法
考虑了识别先令攻击的问题,先令攻击的目的是在推荐系统中形成对对象的错误评级。此类攻击的目的是将攻击用户指定的商品包含在推荐的物品列表中。攻击所获得的推荐将不符合客户的真实偏好,这可能导致对推荐系统的不信任,从而导致销售下降。现有的检测先令攻击的方法使用来自用户的明确反馈,并且主要侧重于构建描述攻击关键特征的模式。然而,这种模式只是部分地考虑了用户兴趣的动态。通过比较用户选择过程和评级的时间描述,提出了一种利用隐式反馈检测先令攻击的方法。这些过程的模型是使用一组加权时间规则形成的,这些规则定义了用户选择给定对象时时刻之间的时间关系。该方法使用按时间排序的输入数据。该方法包括以下几个阶段:形成用于描述销售流程和创建评级的加权时间规则集,计算这些流程的一组评级,以及基于所获得评级的比较形成攻击指标。由此产生的迹象使得区分核武器攻击和推击攻击成为可能。该方法旨在识别购买和评级动态中的差异,即使在某些时间间隔内没有评级值。该技术可以根据评级值和接收到的攻击指示器的比较来确定屏蔽攻击的方法。当迭代应用时,该方法允许细化潜在攻击者的配置文件列表。该技术可以与面向模式的方法结合使用,以识别先令攻击
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信