结合项目时间信息和关系网络的先令攻击检测方法

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING
Shuguang Zhang, Lingjie Liu, Xuntao Zhi, Yu Cheng, Xinyu Zheng, Yunlong Wang
{"title":"结合项目时间信息和关系网络的先令攻击检测方法","authors":"Shuguang Zhang,&nbsp;Lingjie Liu,&nbsp;Xuntao Zhi,&nbsp;Yu Cheng,&nbsp;Xinyu Zheng,&nbsp;Yunlong Wang","doi":"10.1002/cpe.70150","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Shilling attack detection is a method to identify and defend against malicious users in recommender systems, and it mainly detects shilling attackers by analyzing user behavior or item content anomalies. Items in the system subject to shilling attack often present abnormal scoring time-series information and relationship networks, but time-series data has the characteristics of large and unstable data volume, which makes it difficult to directly use raw data for detection, while detection from user relationship networks can often only solve a specific attack problem, and it is difficult to detect coordinated attack behaviors. To address the above issues, we propose a detection method called ITRN, which makes full use of item timing information and relational networks, dividing the time series of item ratings based on important points, constructing cubes for similarity measure using the second-order difference method to obtain the anomalous time intervals and the set of suspicious users, constructing a suspicious user-item bipartite graph, aggregating the higher-order neighboring information of the suspicious users using LightGCN, and then inputting these higher-order embedded inputs into the linear layer that are mapped into a scalar, and finally these scalars are input into the Sigmoid function to obtain the probability of the user being suspicious. Experiments were conducted on three datasets of varying sizes from Movielens, and the results showed that our method improved precision by approximately 0.02 and F1-measure by approximately 0.01 compared to the optimal baseline model.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 15-17","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Shilling Attack Detection Method Integrating Item Temporal Information and Relational Networks\",\"authors\":\"Shuguang Zhang,&nbsp;Lingjie Liu,&nbsp;Xuntao Zhi,&nbsp;Yu Cheng,&nbsp;Xinyu Zheng,&nbsp;Yunlong Wang\",\"doi\":\"10.1002/cpe.70150\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>Shilling attack detection is a method to identify and defend against malicious users in recommender systems, and it mainly detects shilling attackers by analyzing user behavior or item content anomalies. Items in the system subject to shilling attack often present abnormal scoring time-series information and relationship networks, but time-series data has the characteristics of large and unstable data volume, which makes it difficult to directly use raw data for detection, while detection from user relationship networks can often only solve a specific attack problem, and it is difficult to detect coordinated attack behaviors. To address the above issues, we propose a detection method called ITRN, which makes full use of item timing information and relational networks, dividing the time series of item ratings based on important points, constructing cubes for similarity measure using the second-order difference method to obtain the anomalous time intervals and the set of suspicious users, constructing a suspicious user-item bipartite graph, aggregating the higher-order neighboring information of the suspicious users using LightGCN, and then inputting these higher-order embedded inputs into the linear layer that are mapped into a scalar, and finally these scalars are input into the Sigmoid function to obtain the probability of the user being suspicious. Experiments were conducted on three datasets of varying sizes from Movielens, and the results showed that our method improved precision by approximately 0.02 and F1-measure by approximately 0.01 compared to the optimal baseline model.</p>\\n </div>\",\"PeriodicalId\":55214,\"journal\":{\"name\":\"Concurrency and Computation-Practice & Experience\",\"volume\":\"37 15-17\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2025-06-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation-Practice & Experience\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70150\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70150","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

摘要

先令攻击检测是一种在推荐系统中识别和防御恶意用户的方法,主要通过分析用户行为或项目内容异常来检测先令攻击者。系统中遭受先令攻击的项目往往呈现异常的得分时间序列信息和关系网络,但时间序列数据具有数据量大且不稳定的特点,难以直接利用原始数据进行检测,而从用户关系网络进行检测往往只能解决某一特定的攻击问题,难以检测出协同攻击行为。针对上述问题,我们提出了一种名为ITRN的检测方法,该方法充分利用物品时间信息和关系网络,根据重要点划分物品评分的时间序列,利用二阶差分法构造立方体进行相似性度量,得到异常时间间隔和可疑用户集,构造可疑用户-物品二部图;利用LightGCN对可疑用户的高阶相邻信息进行聚合,然后将这些高阶嵌入输入输入到线性层中,并将其映射成标量,最后将这些标量输入到Sigmoid函数中,得到用户被怀疑的概率。在三个不同大小的Movielens数据集上进行了实验,结果表明,与最优基线模型相比,该方法的精度提高了约0.02,F1-measure提高了约0.01。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Shilling Attack Detection Method Integrating Item Temporal Information and Relational Networks

Shilling attack detection is a method to identify and defend against malicious users in recommender systems, and it mainly detects shilling attackers by analyzing user behavior or item content anomalies. Items in the system subject to shilling attack often present abnormal scoring time-series information and relationship networks, but time-series data has the characteristics of large and unstable data volume, which makes it difficult to directly use raw data for detection, while detection from user relationship networks can often only solve a specific attack problem, and it is difficult to detect coordinated attack behaviors. To address the above issues, we propose a detection method called ITRN, which makes full use of item timing information and relational networks, dividing the time series of item ratings based on important points, constructing cubes for similarity measure using the second-order difference method to obtain the anomalous time intervals and the set of suspicious users, constructing a suspicious user-item bipartite graph, aggregating the higher-order neighboring information of the suspicious users using LightGCN, and then inputting these higher-order embedded inputs into the linear layer that are mapped into a scalar, and finally these scalars are input into the Sigmoid function to obtain the probability of the user being suspicious. Experiments were conducted on three datasets of varying sizes from Movielens, and the results showed that our method improved precision by approximately 0.02 and F1-measure by approximately 0.01 compared to the optimal baseline model.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Concurrency and Computation-Practice & Experience
Concurrency and Computation-Practice & Experience 工程技术-计算机:理论方法
CiteScore
5.00
自引率
10.00%
发文量
664
审稿时长
9.6 months
期刊介绍: Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of: Parallel and distributed computing; High-performance computing; Computational and data science; Artificial intelligence and machine learning; Big data applications, algorithms, and systems; Network science; Ontologies and semantics; Security and privacy; Cloud/edge/fog computing; Green computing; and Quantum computing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信