A Trust-Based Detecting Mechanism against Profile Injection Attacks in Recommender Systems

Recommender systems could be applied in grid environment to help grid users select more suitable services by making high quality personalized recommendations. Also, recommendation could be employed in the virtual machines managing platform to measure the performance and creditability of each virtual machine. However, such systems have been shown to be vulnerable to profile injection attacks (shilling attacks), attacks that involve the insertion of malicious profiles into the ratings database for the purpose of altering the system’s recommendation behavior. In this paper we introduce and evaluate a new trust-based detecting algorithm for protecting recommender systems against profile injection attacks. Moreover, we discuss the combination of our trust-based metrics with previous metrics such as RDMA in profile-level and item-level respectively. In the end, we show these metrics can lead to improved detecting accuracy experimentally.

[1]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[2]  Neil J. Hurley,et al.  Utility-based neighbourhood formation for efficient and robust collaborative filtering , 2004, EC '04.

[3]  Zheng Chen,et al.  Finding group shilling in recommendation system , 2005, WWW '05.

[4]  Bamshad Mobasher,et al.  Segment-based injection attacks against collaborative filtering recommender systems , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[5]  John Riedl,et al.  An algorithmic framework for performing collaborative filtering , 1999, SIGIR '99.

[6]  David Heckerman,et al.  Empirical Analysis of Predictive Algorithms for Collaborative Filtering , 1998, UAI.

[7]  Robin Burke,et al.  Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems , 2005 .

[8]  Bamshad Mobasher,et al.  Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation , 2005, WEBKDD.

[9]  Fillia Makedon,et al.  Analysis of a low-dimensional linear model under recommendation attacks , 2006, SIGIR.

[10]  Thomas Hofmann,et al.  Robust collaborative filtering , 2007, RecSys '07.

[11]  John Riedl,et al.  Influence in Ratings-Based Recommender Systems: An Algorithm-Independent Approach , 2005, SDM.

[12]  R. Burke,et al.  Limited Knowledge Shilling Attacks in Collaborative Filtering Systems , 2005 .

[13]  John Riedl,et al.  Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.

[14]  Wolfgang Nejdl,et al.  Preventing shilling attacks in online recommender systems , 2005, WIDM '05.

[15]  Robin Burke,et al.  Identifying Attack Models for Secure Recommendation , 2004 .

[16]  Barry Smyth,et al.  Trust in recommender systems , 2005, IUI.

[17]  Bamshad Mobasher,et al.  Detecting Profile Injection Attacks in Collaborative Filtering: A Classification-Based Approach , 2006, WEBKDD.

[18]  Bamshad Mobasher,et al.  Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.