Detection of Shilling Attack Based on T-distribution on the Dynamic Time Intervals in Recommendation Systems

08/18/2019
by   Wanqiao Yuan, et al.
0

With the development of information technology and the Internet, recommendation systems have become an important means to solve the problem of information overload. However, recommendation system is greatly fragile as it relies heavily on behavior data of users, which makes it very easy for a host of malicious merchants to inject shilling attacks in order to manipulate the recommendation results. Some papers on shilling attack have proposed the detection methods, whether based on false user profiles or abnormal items, but their detection rate, false alarm rate, universality, and time overhead need to be further improved. In this paper, we propose a new item anomaly detection method, through T-distribution technology based on Dynamic Time Intervals. First of all, based on the characteristics of shilling attack quickness (Attackers inject a large number of fake profiles in a short period in order to save costs), we use dynamic time interval method to divide the rating history of item into multiple time windows. Then, we use the T-distribution to detect the exception windows. By conducting extensive experiments on a dataset that accords with real-life situations and comparing it to currently outstanding methods, our proposed approach has a higher detection rate, lower false alarm rate and smaller time overhead to the different attack models and filler sizes.

READ FULL TEXT
research
08/18/2019

A Novel Kalman Filter Based Shilling Attack Detection Algorithm

Collaborative filtering has been widely used in recommendation systems t...
research
03/28/2019

DDoS Attack Detection Method Based on Network Abnormal Behavior in Big Data Environment

Distributed denial of service (DDoS) attack becomes a rapidly growing pr...
research
09/21/2018

Adversarial Recommendation: Attack of the Learned Fake Users

Can machine learning models for recommendation be easily fooled? While t...
research
04/07/2020

Practical Data Poisoning Attack against Next-Item Recommendation

Online recommendation systems make use of a variety of information sourc...
research
08/21/2019

Assessing the Impact of a User-Item Collaborative Attack on Class of Users

Collaborative Filtering (CF) models lie at the core of most recommendati...
research
02/14/2023

Practical Cross-System Shilling Attacks with Limited Access to Data

In shilling attacks, an adversarial party injects a few fake user profil...
research
06/18/2021

BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection

Graph-based Anomaly Detection (GAD) is becoming prevalent due to the pow...

Please sign up or login with your details

Forgot password? Click here to reset