User profile attack anomaly detection algorithm based on time series analysis

被引:0
|
作者
Xu, Yuchen [1 ]
Liang, Qiang [1 ]
Zhang, Fuzhi [1 ]
机构
[1] School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, China
来源
关键词
Signal detection - User profile - Time series analysis - Recommender systems;
D O I
暂无
中图分类号
学科分类号
摘要
Collaborative filtering recommender systems are vulnerable to manipulation by malicious attacks, which can significantly affect the robustness of recommender systems. Aims at the defects and deficiencies of the previous attack detection methods, we propose an anomaly detection algorithm based on analyzing rating distribution characteristics of item over rating time series. First, we generate the rating time series by sorting the ratings based on the time stamps of each item; then partition the time series into several consecutive groups according to certain time interval, and calculate the sample average confidence interval of ratings for the item-self. We detect the item whether is under attack by monitor the rating behavior during the new coming time period. The experimental results show the effectiveness of our proposed algorithm. © 2010 Binary Information Press.
引用
收藏
页码:2201 / 2206
相关论文
共 50 条
  • [31] Network Traffic Anomaly Detection Algorithm Based on Intuitionistic Fuzzy Time Series Graph Mining
    Wang, Ya-Nan
    Wang, Jian
    Fan, Xiaoshi
    Song, Yafei
    IEEE ACCESS, 2020, 8 (08): : 63381 - 63389
  • [32] A Modified DBSCAN Algorithm for Anomaly Detection in Time-series Data with
    Jain, Praphula
    Bajpai, Mani Shankar
    Pamula, Rajendra
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2022, 19 (01) : 23 - 28
  • [33] A Novel LSTM-GAN Algorithm for Time Series Anomaly Detection
    Zhu, Guangxuan
    Zhao, Hongbo
    Liu, Haoqiang
    Sun, Hua
    2019 PROGNOSTICS AND SYSTEM HEALTH MANAGEMENT CONFERENCE (PHM-QINGDAO), 2019,
  • [34] Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection
    Landauer, Max
    Wurzenberger, Markus
    Skopik, Florian
    Settanni, Giuseppe
    Filzmoser, Peter
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 19 - 36
  • [35] Two-stage Detection Algorithm for RoQ attack Based on Localized Periodicity Analysis of Traffic Anomaly
    Wen, Kun
    Yang, Jiahai
    Cheng, Fengjuan
    Li, Chenxi
    Wang, Ziyu
    Yin, Hui
    2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [36] Eagle: User Profile-based Anomaly Detection for Securing Hadoop Clusters
    Gupta, Chaitali
    Sinha, Ranjan
    Zhang, Yong
    PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2015, : 1336 - 1343
  • [37] A Novel Network user Behaviors and Profile Testing based on Anomaly Detection Techniques
    Tahir, Muhammad
    Li, Mingchu
    Zheng, Xiao
    Carie, Anil
    Jin, Xing
    Azhar, Muhammad
    Ayoub, Naeem
    Wagan, Atif
    Aamir, Muhammad
    Jamali, Liaquat Ali
    Imran, Muhammad Asif
    Hulio, Zahid Hussain
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (06) : 305 - 324
  • [38] Stochastic Learning Automata-Based Time Series Analysis for Network Anomaly Detection
    Yasami, Yasser
    Mozaffari, Saadat Pour
    Khorsandi, Siavash
    2008 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 313 - 318
  • [39] A novel spectrum occupancy anomaly detection method based on time series analysis theory
    Wang Lei
    Xie Shuguo
    2012 IEEE INTERNATIONAL WORKSHOP ON ELECTROMAGNETICS: APPLICATIONS AND STUDENT INNOVATION COMPETITION (IWEM), 2012,
  • [40] Symbolic time-series analysis for anomaly detection in mechanical
    Khatkhate, Amol
    Ray, Asok
    Keller, Eric
    Gupta, Shalabh
    Chin, Shin C.
    IEEE-ASME TRANSACTIONS ON MECHATRONICS, 2006, 11 (04) : 439 - 447