《Nuke’Em until They Go:调查高级用户在协作推荐中贬低道具的攻击

C. E. Seminario, David C. Wilson
{"title":"《Nuke’Em until They Go:调查高级用户在协作推荐中贬低道具的攻击","authors":"C. E. Seminario, David C. Wilson","doi":"10.1145/2792838.2799666","DOIUrl":null,"url":null,"abstract":"Recommender Systems (RSs) can be vulnerable to manipulation by malicious users who successfully bias recommendations for their own benefit or pleasure. These are known as attacks on RSs and are typically used to either promote (\"push\") or disparage (\"nuke\") targeted items contained within the recommender's user-item dataset. Our recent work with the Power User Attack (PUA) model, determined that attackers disguised as influential power users can mount successful (from the attacker's viewpoint) push attacks against user-based, item-based, and SVD-based recommenders. However, the success of push attack vectors may not be symmetric for nuke attacks, which target the opposite effect --- reducing the likelihood that target items appear in users' top-N lists. The asymmetry between push and nuke attacks is highlighted when evaluating these attacks using traditional robustness metrics such as Rank and Prediction Shift. This paper examines the PUA attack model in the context of nuke attacks, in order to investigate the differences between push and nuke attack orientations, as well as how they are evaluated. In this work we show that the PUA is able to mount successful nuke attacks against commonly-used recommender algorithms highlighting the \"nuke vs. push\" asymmetry in the results.","PeriodicalId":325637,"journal":{"name":"Proceedings of the 9th ACM Conference on Recommender Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Nuke 'Em Till They Go: Investigating Power User Attacks to Disparage Items in Collaborative Recommenders\",\"authors\":\"C. E. Seminario, David C. Wilson\",\"doi\":\"10.1145/2792838.2799666\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recommender Systems (RSs) can be vulnerable to manipulation by malicious users who successfully bias recommendations for their own benefit or pleasure. These are known as attacks on RSs and are typically used to either promote (\\\"push\\\") or disparage (\\\"nuke\\\") targeted items contained within the recommender's user-item dataset. Our recent work with the Power User Attack (PUA) model, determined that attackers disguised as influential power users can mount successful (from the attacker's viewpoint) push attacks against user-based, item-based, and SVD-based recommenders. However, the success of push attack vectors may not be symmetric for nuke attacks, which target the opposite effect --- reducing the likelihood that target items appear in users' top-N lists. The asymmetry between push and nuke attacks is highlighted when evaluating these attacks using traditional robustness metrics such as Rank and Prediction Shift. This paper examines the PUA attack model in the context of nuke attacks, in order to investigate the differences between push and nuke attack orientations, as well as how they are evaluated. In this work we show that the PUA is able to mount successful nuke attacks against commonly-used recommender algorithms highlighting the \\\"nuke vs. push\\\" asymmetry in the results.\",\"PeriodicalId\":325637,\"journal\":{\"name\":\"Proceedings of the 9th ACM Conference on Recommender Systems\",\"volume\":\"77 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 9th ACM Conference on Recommender Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2792838.2799666\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 9th ACM Conference on Recommender Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2792838.2799666","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

推荐系统(RSs)很容易受到恶意用户的操纵,他们为了自己的利益或快乐而成功地对推荐进行了偏见。这些被称为对RSs的攻击,通常用于推广(“push”)或贬低(“nuke”)包含在推荐用户-条目数据集中的目标条目。我们最近对高级用户攻击(PUA)模型的研究表明,伪装成有影响力的高级用户的攻击者可以成功地(从攻击者的角度来看)对基于用户、基于项目和基于svd的推荐器发起推送攻击。然而,对于核攻击来说,推送攻击向量的成功可能并不对称,它的目标是相反的效果——降低目标物品出现在用户top-N列表中的可能性。在使用传统的鲁棒性指标(如Rank和Prediction Shift)评估这些攻击时,突出了推送攻击和核攻击之间的不对称性。本文研究了核攻击背景下的PUA攻击模型,以研究推送和核攻击方向之间的差异,以及如何对它们进行评估。在这项工作中,我们证明了PUA能够对常用的推荐算法进行成功的核攻击,突出了结果中的“核与推送”不对称。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Nuke 'Em Till They Go: Investigating Power User Attacks to Disparage Items in Collaborative Recommenders
Recommender Systems (RSs) can be vulnerable to manipulation by malicious users who successfully bias recommendations for their own benefit or pleasure. These are known as attacks on RSs and are typically used to either promote ("push") or disparage ("nuke") targeted items contained within the recommender's user-item dataset. Our recent work with the Power User Attack (PUA) model, determined that attackers disguised as influential power users can mount successful (from the attacker's viewpoint) push attacks against user-based, item-based, and SVD-based recommenders. However, the success of push attack vectors may not be symmetric for nuke attacks, which target the opposite effect --- reducing the likelihood that target items appear in users' top-N lists. The asymmetry between push and nuke attacks is highlighted when evaluating these attacks using traditional robustness metrics such as Rank and Prediction Shift. This paper examines the PUA attack model in the context of nuke attacks, in order to investigate the differences between push and nuke attack orientations, as well as how they are evaluated. In this work we show that the PUA is able to mount successful nuke attacks against commonly-used recommender algorithms highlighting the "nuke vs. push" asymmetry in the results.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信