Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering

被引:18
|
作者
Zhang, Fuzhi [1 ,2 ]
Wang, Shilei [1 ,2 ]
机构
[1] Yanshan Univ, Sch Informat Sci & Engn, Qinhuangdao 066000, Hebei, Peoples R China
[2] Key Lab Comp Virtual Technol & Syst Integrat Hebe, Qinhuangdao 066000, Hebei, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Recommender systems; Feature extraction; Clustering algorithms; Principal component analysis; Target tracking; Support vector machines; Bisecting K-means clustering; group shilling attack detection; group shilling attacks; recommender systems;
D O I
10.1109/TCSS.2020.3013878
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Existing shilling attack detection approaches focus mainly on identifying individual attackers in online recommender systems and rarely address the detection of group shilling attacks in which a group of attackers colludes to bias the output of an online recommender system by injecting fake profiles. In this article, we propose a group shilling attack detection method based on the bisecting K-means clustering algorithm. First, we extract the rating track of each item and divide the rating tracks to generate candidate groups according to a fixed time interval. Second, we propose item attention degree and user activity to calculate the suspicious degrees of candidate groups. Finally, we employ the bisecting K-means algorithm to cluster the candidate groups according to their suspicious degrees and obtain the attack groups. The results of experiments on the Netflix and Amazon data sets indicate that the proposed method outperforms the baseline methods.
引用
收藏
页码:1189 / 1199
页数:11
相关论文
共 50 条
  • [31] A NOVEL APPROACH TOWARDS BISECTING K-MEANS CLUSTERING ALGORITHM PARALLELISM
    Zhang Junwei
    Wang Nianbin
    Huang Shaobin
    [J]. 2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 2, 2012, : 25 - 31
  • [32] GRAPH-BASED DETECTION OF SHILLING ATTACKS IN RECOMMENDER SYSTEMS
    Zhang, Zhuo
    Kulkarni, Sanjeev R.
    [J]. 2013 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2013,
  • [33] Targeted Shilling Attacks on GNN-based Recommender Systems
    Guo, Sihan
    Bai, Ting
    Deng, Weihong
    [J]. PROCEEDINGS OF THE 32ND ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2023, 2023, : 649 - 658
  • [34] Dynamic Construction of Outlier Detector Ensembles With Bisecting K-Means Clustering
    Koko, Rasha Ramadan Z.
    Yassine, Inas A.
    Wahed, Manal Abdel
    Madete, June K.
    Rushdi, Muhammad A.
    [J]. IEEE ACCESS, 2023, 11 : 24431 - 24447
  • [35] Bisecting k-means based fingerprint indoor localization
    Yuxing Chen
    Wei Liu
    Haojie Zhao
    Shulin Cao
    Shasha Fu
    Dingde Jiang
    [J]. Wireless Networks, 2021, 27 : 3497 - 3506
  • [36] Bisecting k-means based fingerprint indoor localization
    Chen, Yuxing
    Liu, Wei
    Zhao, Haojie
    Cao, Shulin
    Fu, Shasha
    Jiang, Dingde
    [J]. WIRELESS NETWORKS, 2021, 27 (05) : 3497 - 3506
  • [37] Detecting CAM Flooding Attacks in Vehicular Networks Using Online K-means Algorithm
    Razzazi, Harir
    Nait-Abdesselam, Farid
    Hamouda, Essia
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2985 - 2990
  • [38] Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis
    Zhou, Wei
    Wen, Junhao
    Koh, Yun Sing
    Xiong, Qingyu
    Gao, Min
    Dobbie, Gillian
    Alam, Shafiq
    [J]. PLOS ONE, 2015, 10 (07):
  • [39] Efficient online spherical K-means clustering
    Zhong, S
    [J]. PROCEEDINGS OF THE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), VOLS 1-5, 2005, : 3180 - 3185
  • [40] Robust Algorithms for Online k-means Clustering
    Bhaskara, Aditya
    Ruwanpathirana, Aravinda Kanchana
    [J]. ALGORITHMIC LEARNING THEORY, VOL 117, 2020, 117 : 148 - 173