Detecting shilling attacks in private environments

被引:0
|
作者
Ihsan Gunes
Huseyin Polat
机构
[1] Anadolu University,Computer Engineering Department
来源
关键词
Detection; Shilling attack; Privacy; Collaborative filtering; Recommendation;
D O I
暂无
中图分类号
学科分类号
摘要
Privacy-preserving collaborative filtering algorithms are successful approaches. However, they are susceptible to shilling attacks. Recent research has increasingly focused on collaborative filtering to protect against both privacy and shilling attacks. Malicious users may add fake profiles to manipulate the output of privacy-preserving collaborative filtering systems, which reduces the accuracy of these systems. Thus, it is imperative to detect fake profiles for overall success. Many methods have been developed for detecting attack profiles to keep them outside of the system. However, these techniques have all been established for non-private collaborative filtering schemes. The detection of shilling attacks in privacy-preserving recommendation systems has not been deeply examined. In this study, we examine the detection of shilling attacks in privacy-preserving collaborative filtering systems. We utilize four attack-detection methods to filter out fake profiles produced by six well-known shilling attacks on perturbed data. We evaluate these detection methods with respect to their ability to identify bogus profiles. Real data-based experiments are performed. Empirical outcomes demonstrate that some of the detection methods are very successful at filtering out fake profiles in privacy-preserving collaborating filtering schemes.
引用
收藏
页码:547 / 572
页数:25
相关论文
共 50 条
  • [1] Detecting shilling attacks in private environments
    Gunes, Ihsan
    Polat, Huseyin
    [J]. INFORMATION RETRIEVAL JOURNAL, 2016, 19 (06): : 547 - 572
  • [2] Detecting Unknown Shilling Attacks in Recommendation Systems
    Singh, Pradeep Kumar
    Pramanik, Pijush Kanti Dutta
    Sinhababu, Nilanjan
    Choudhury, Prasenjit
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (01) : 259 - 286
  • [3] An unsupervised algorithm for detecting shilling attacks on recommender systems
    Li, Cong
    Luo, Zhi-Gang
    Shi, Jin-Long
    [J]. Zidonghua Xuebao/Acta Automatica Sinica, 2011, 37 (02): : 160 - 167
  • [4] Detecting Shilling Attacks Using Hybrid Deep Learning Models
    Ebrahimian, Mahsa
    Kashef, Rasha
    [J]. SYMMETRY-BASEL, 2020, 12 (11): : 1 - 15
  • [5] A Belief Propagation Approach for Detecting Shilling Attacks in Collaborative Filtering
    Zou, Jun
    Fekri, Faramarz
    [J]. PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13), 2013, : 1837 - 1840
  • [6] Detecting Shilling Attacks with Automatic Features from Multiple Views
    Hao, Yaojun
    Zhang, Fuzhi
    Wang, Jian
    Zhao, Qingshan
    Cao, Jianfang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [7] Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems
    Hao, Yaojun
    Zhang, Peng
    Zhang, Fuzhi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] An ensemble method for detecting shilling attacks based on ordered item sequences
    Zhang, Fuzhi
    Chen, Honghong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (07) : 680 - 696
  • [9] Detecting shilling attacks in recommender systems based on analysis of user rating behavior
    Cai, Hongyun
    Zhang, Fuzhi
    [J]. KNOWLEDGE-BASED SYSTEMS, 2019, 177 : 22 - 43
  • [10] A novel clustered-based detection method for shilling attack in private environments
    Gunes, Ihsan
    [J]. PEERJ COMPUTER SCIENCE, 2024, 10