A Comparative Study on Shilling Detection Methods for Trustworthy Recommendations
Youquan Wang , Liqiang Qian , Fanzhang Li , Lu Zhang
Journal of Systems Science and Systems Engineering ›› 2018, Vol. 27 ›› Issue (4) : 458 -478.
A Comparative Study on Shilling Detection Methods for Trustworthy Recommendations
Uncovering shilling attackers hidden in recommender systems is very crucial to enhance the robustness and trustworthiness of product recommendation. Many shilling attack detection algorithms have been proposed so far, and they exhibit complementary advantage and disadvantage towards various types of attackers. In this paper, we provide a thorough experimental comparison of several well-known detectors, including supervised C4.5 and NB, unsupervised PCA and MDS, semi-supervised HySAD methods, as well as statistical analysis methods. MovieLens 100K is the most widely-used dataset in the realm of shilling attack detection, and thus it is selected as the benchmark dataset. Meanwhile, seven types of shilling attacks generated by average-filling and random-filling model are compared in our experiments. As a result of our analysis, we show clearly causes and essential characteristics insider attackers that might determine the success or failure of different kinds of detectors.
Recommender system / shilling attack detection / supervised classification / unsupervised clustering / statistical analysis methods
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
Mobasher, B., Burke, R. & Sandvig, J. (2006). Model–based collaborative filtering as a defense against profile injection attacks. In Gil Y, Mooney R (eds.), Proceedings of the 21st National Conference on Artificial Intelligence: 1388–1393, Boston, Massachusetts, July 16, 2017, AAAI Press. |
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
|
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
Wu, Z., Wu, J., Cao, J. & Tao, D. (2012). HySAD: A semi–supervised hybrid shilling attack detector for trustworthy product recommendation. In Yang Q, Agarwal D, Pei J (eds.), Proceedings of the 18th ACM SIGKDD International Conference On Knowledge Discovery and Data Mining: 985–993, Beijing, China, August 12–16, 2012, ACM. |
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
Zhang, S., Ouyang, Y., Ford, J. & Makedon, F. (2006). Analysis of a low–dimensional linear model under recommendation attacks. In Efthimiadis E, Dumais S, Hawking D, Jarvelin K (eds.), Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval: 517–524, Seattle, USA, August 6–11, 2006, ACM. |
| [31] |
Zhang, S., Chakrabarti, A., Ford, J. & Makedon, F. (2006). Attack detection in time series for recommender systems. In Eliassi–Rad T, Ungar L, Craven M, Gunopulos D (eds.), Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining: 809–814, Philadelphia, USA, August 20–23, 2006, ACM. |
| [32] |
|
| [33] |
|
/
| 〈 |
|
〉 |