Detection of shilling attack in recommender system for YouTube video statistics using machine learning techniques

被引:0
|
作者
Shalli Rani
Manpreet Kaur
Munish Kumar
Vinayakumar Ravi
Uttam Ghosh
Jnyana Ranjan Mohanty
机构
[1] Chitkara University,Chitkara University Institute of Engineering and Technology
[2] Maharaja Ranjit Singh Punjab Technical University,Department of Computational Sciences
[3] Prince Mohammad Bin Fahd University,Center for Artificial Intelligence
[4] Vanderbilt University,undefined
[5] Kalinga Institute of Industrial Technology (KIIT) Deemed To Be University,undefined
来源
Soft Computing | 2023年 / 27卷
关键词
Recommender system; Shilling attack; Collaborative filtering; YouTube video statistics; Machine learning; Cyber attacks; Security threats; Defense systems; Soft computing;
D O I
暂无
中图分类号
学科分类号
摘要
Literature survey shows that the recommendation systems have been largely adapted and evaluated in various domains. Due to low performances from various cyber attacks, the adoption of recommender system is in the initial stage of defense systems. One of the most common attacks for recommender system is shilling attack. There are some existing techniques for identifying the shilling attacks built in the user ratings patterns. The performance of ratings on target items differs between the attack user profiles and actual user profiles. To differentiate the certain profiles, the affected profiles are known as attack profiles. Besides the shilling attacks, real cyber attacks are taking place in the community which are being solved by Petri Net methods. These attacks can be falsely predicted (shilling attacks) by the users which can raise security threats. For identifying various shilling attacks without a priori knowledge, Recommendation System suffers from low accuracy. Basically, recommendation attack is split into nuke and push attack that encourage and discourage the recommended target item. The strength of shilling attack is usually measured by filler size and attack size. An experiment over unsupervised machine learning algorithms with filler size 3% over 3%, 5%, 8% and 10% attack sizes is presented for Netflix dataset. Furthermore, we conducted an experiment on data of 26 K videos on the Trending YouTube Video Statistics, to predict the user preferences for a particular genre of videos using Machine Learning Algorithms. Based on the results, it observed that the Boosted Decision tree performs the best with an accuracy of 99 percent.
引用
收藏
页码:377 / 389
页数:12
相关论文
共 50 条
  • [21] Adult video content detection using Machine Learning Techniques
    Ochoa, Victor M. Torres
    Yayilgan, Sule Yildirim
    Cheikh, Faouzi Alaya
    [J]. 8TH INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGY & INTERNET BASED SYSTEMS (SITIS 2012), 2012, : 967 - 974
  • [22] Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques
    Kotlaba, Lukas
    Buchovecka, Simona
    Lorencz, Robert
    [J]. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 376 - 383
  • [23] A Lightweight Model for DDoS Attack Detection Using Machine Learning Techniques
    Sadhwani, Sapna
    Manibalan, Baranidharan
    Muthalagu, Raja
    Pawar, Pranav
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (17):
  • [24] DDoS Attack Detection on IoT Devices Using Machine Learning Techniques
    Kumar, Sunil
    Sahu, Rohit Kumar
    Rudra, Bhawana
    [J]. INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA 2021, 2022, 418 : 787 - 794
  • [25] A recommender system for component-based applications using machine learning techniques
    Jesus Fernandez-Garcia, Antonio
    Iribarne, Luis
    Corral, Antonio
    Criado, Javier
    Wang, James Z.
    [J]. KNOWLEDGE-BASED SYSTEMS, 2019, 164 : 68 - 84
  • [26] Video Recommendation System Using Machine-Learning Techniques
    Meesala Sravani
    Ch Vidyadhari
    S Anjali Devi
    [J]. JournalofHarbinInstituteofTechnology(NewSeries), 2024, 31 (04) : 24 - 33
  • [27] Unsupervised contaminated user profile identification against shilling attack in recommender system
    Zhang F.
    Chan P.P.K.
    He Z.-M.
    Yeung D.S.
    [J]. Intelligent Data Analysis, 2024, 1 (01)
  • [28] Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques
    AlZubi, Ahmad Ali
    Al-Maitah, Mohammed
    Alarifi, Abdulaziz
    [J]. SOFT COMPUTING, 2021, 25 (18) : 12319 - 12332
  • [29] Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques
    Ahmad Ali AlZubi
    Mohammed Al-Maitah
    Abdulaziz Alarifi
    [J]. Soft Computing, 2021, 25 : 12319 - 12332
  • [30] Learning User Preferences for Recommender System Using YouTube Videos Tags
    Tiwari, Sunita
    Jain, Abhishek
    Kothari, Prakhar
    Upadhyay, Rahul
    Singh, Kanishth
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT IV, 2018, 10963 : 464 - 473