{"title":"推荐系统中混淆攻击的无监督检测","authors":"S. S. Hashmi, Sang-Wook Kim","doi":"10.1145/2663761.2664232","DOIUrl":null,"url":null,"abstract":"Biased ratings of attack profiles have a significant impact on the effectiveness of collaborative recommender systems. Previous work has shown standard memory-based recommendation algorithms, such as k-nearest neighbor (kNN), susceptible to the attacks compared with model-based collaborative filtering (CF) algorithms. An obfuscated diverse attack strategy made model-based algorithms vulnerable to attacks. Attack profiles generated with this strategy are also able to avoid principal component analysis (PCA)-based detection. This paper proposes an algorithm to detect obfuscated diverse attack profiles. Profiles' pairwise covariance with each other is used to separate attack profiles from genuine profiles. Through extensive experiments, we demonstrate that our algorithm detects these attack profiles with high accuracy.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Unsupervised detection of obfuscated diverse attacks in recommender systems\",\"authors\":\"S. S. Hashmi, Sang-Wook Kim\",\"doi\":\"10.1145/2663761.2664232\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Biased ratings of attack profiles have a significant impact on the effectiveness of collaborative recommender systems. Previous work has shown standard memory-based recommendation algorithms, such as k-nearest neighbor (kNN), susceptible to the attacks compared with model-based collaborative filtering (CF) algorithms. An obfuscated diverse attack strategy made model-based algorithms vulnerable to attacks. Attack profiles generated with this strategy are also able to avoid principal component analysis (PCA)-based detection. This paper proposes an algorithm to detect obfuscated diverse attack profiles. Profiles' pairwise covariance with each other is used to separate attack profiles from genuine profiles. Through extensive experiments, we demonstrate that our algorithm detects these attack profiles with high accuracy.\",\"PeriodicalId\":120340,\"journal\":{\"name\":\"Research in Adaptive and Convergent Systems\",\"volume\":\"63 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Research in Adaptive and Convergent Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2663761.2664232\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Research in Adaptive and Convergent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2663761.2664232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Unsupervised detection of obfuscated diverse attacks in recommender systems
Biased ratings of attack profiles have a significant impact on the effectiveness of collaborative recommender systems. Previous work has shown standard memory-based recommendation algorithms, such as k-nearest neighbor (kNN), susceptible to the attacks compared with model-based collaborative filtering (CF) algorithms. An obfuscated diverse attack strategy made model-based algorithms vulnerable to attacks. Attack profiles generated with this strategy are also able to avoid principal component analysis (PCA)-based detection. This paper proposes an algorithm to detect obfuscated diverse attack profiles. Profiles' pairwise covariance with each other is used to separate attack profiles from genuine profiles. Through extensive experiments, we demonstrate that our algorithm detects these attack profiles with high accuracy.