Quick and accurate attack detection in recommender systems through user attributes

Malicious profiles have been a credible threat to collaborative recommender systems. Attackers provide fake item ratings to systematically manipulate the platform. Attack detection algorithms can identify and remove such users by observing rating distributions. In this study, we aim to use the user attributes as an additional information source to improve the accuracy and speed of attack detection. We propose a probabilistic factorization model which can embed mixed data type user attributes and observed ratings into a latent space to generate anomaly statistics for new users. To identify the persistent outliers in the system, we also propose a sequential attack detection algorithm to enable quick and accurate detection based on the probabilistic model learned from genuine users. The proposed model demonstrates significant improvements in both accuracy and speed when compared to baseline algorithms on a popular benchmark dataset.

[1]  Sanjeev R. Kulkarni,et al.  Graph-based detection of shilling attacks in recommender systems , 2013, 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP).

[2]  Zunping Cheng,et al.  Statistical attack detection , 2009, RecSys '09.

[3]  D. Böhning Multinomial logistic regression algorithm , 1992 .

[4]  R. Burke,et al.  A Clustering Approach to Unsupervised Attack Detection in Collaborative Recommender Systems , 2022 .

[5]  Mohammad Emtiyaz Khan,et al.  Variational bounds for mixed-data factor analysis , 2010, NIPS.

[6]  Yuhong Liu,et al.  Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis , 2010, 2010 IEEE Second International Conference on Social Computing.

[7]  Bhaskar Mehta,et al.  Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.

[8]  N. Lazar,et al.  The ASA Statement on p-Values: Context, Process, and Purpose , 2016 .

[9]  Huseyin Polat,et al.  A Novel Shilling Attack Detection Method , 2014, ITQM.

[10]  Padraig Cunningham,et al.  Unsupervised retrieval of attack profiles in collaborative recommender systems , 2008, RecSys '08.

[11]  Charu C. Aggarwal,et al.  Recommender Systems: The Textbook , 2016 .

[12]  Wolfgang Nejdl,et al.  Preventing shilling attacks in online recommender systems , 2005, WIDM '05.

[13]  Zhongmin Cai,et al.  Estimating user behavior toward detecting anomalous ratings in rating systems , 2016, Knowl. Based Syst..

[14]  Michèle Basseville,et al.  Detection of abrupt changes: theory and application , 1993 .

[15]  Geoffrey E. Hinton,et al.  The EM algorithm for mixtures of factor analyzers , 1996 .

[16]  Neil J. Hurley,et al.  An Evaluation of Neighbourhood Formation on the Performance of Collaborative Filtering , 2004, Artificial Intelligence Review.

[17]  Bamshad Mobasher,et al.  Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.

[18]  Robin Burke,et al.  Securing collaborative filtering against malicious attacks through anomaly detection , 2006, AAAI 2006.

[19]  Jong-Seok Lee,et al.  Shilling Attack Detection - A New Approach for a Trustworthy Recommender System , 2012, INFORMS J. Comput..

[20]  Xiaodong Wang,et al.  Quickest Attack Detection in Multi-Agent Reputation Systems , 2014, IEEE Journal of Selected Topics in Signal Processing.

[21]  Kevin P. Murphy,et al.  Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.

[22]  Sanjeev R. Kulkarni,et al.  Detection of shilling attacks in recommender systems via spectral clustering , 2014, 17th International Conference on Information Fusion (FUSION).

[23]  Zhigang Luo,et al.  Detection of shilling attacks in collaborative filtering recommender systems , 2011, 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR).

[24]  Peng Zhang,et al.  UD-HMM: An unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering , 2018, Knowl. Based Syst..