Sequential Attack Detection in Recommender Systems

Recommender systems are widely used in electronic commerce, social media and online streaming services to provide personalized recommendations to the users by exploiting past ratings and interactions. This paper considers the security aspect with quick and accurate detection of attacks by observing the newly created profiles sequentially to prevent the damage which may be incurred by the injection of new profiles with dishonest ratings. The proposed framework consists of a latent variable model, which is trained by a variational EM algorithm, followed by a sequential detection algorithm. The latent variable model generates homogeneous representations of the users given their rating history and mixed data-type attributes such as age and gender. The representations are then exploited to generate univariate statistics to be efficiently used in a CUSUM-like sequential detection algorithm that can quickly detect persistent attacks while maintaining low false alarm rates. We apply our proposed framework to three different real-world datasets and exhibit superior performance in comparison to the existing baseline algorithms for both attack profile and sequential detection. Furthermore, we demonstrate robustness to different attack strategies and configurations.

[1]  D. Böhning Multinomial logistic regression algorithm , 1992 .

[2]  Zhigang Luo,et al.  Detection of shilling attacks in collaborative filtering recommender systems , 2011, 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR).

[3]  Lior Rokach,et al.  Introduction to Recommender Systems Handbook , 2011, Recommender Systems Handbook.

[4]  Jieping Ye,et al.  A Small Sphere and Large Margin Approach for Novelty Detection Using Training Data with Outliers , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[5]  Yehuda Koren,et al.  Matrix Factorization Techniques for Recommender Systems , 2009, Computer.

[6]  Qingshan Li,et al.  Shilling attacks against collaborative recommender systems: a review , 2018, Artificial Intelligence Review.

[7]  Neil J. Hurley,et al.  An Evaluation of Neighbourhood Formation on the Performance of Collaborative Filtering , 2004, Artificial Intelligence Review.

[8]  Robin Burke,et al.  Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems , 2005 .

[9]  David C. Wilson,et al.  When power users attack: assessing impacts in collaborative recommender systems , 2013, RecSys.

[10]  Zunping Cheng,et al.  Effective diverse and obfuscated attacks on model-based recommender systems , 2009, RecSys '09.

[11]  Zunping Cheng,et al.  Statistical attack detection , 2009, RecSys '09.

[12]  Charu C. Aggarwal,et al.  Recommender Systems: The Textbook , 2016 .

[13]  Geoffrey E. Hinton,et al.  The EM algorithm for mixtures of factor analyzers , 1996 .

[14]  Tapani Raiko,et al.  Tkk Reports in Information and Computer Science Practical Approaches to Principal Component Analysis in the Presence of Missing Values Tkk Reports in Information and Computer Science Practical Approaches to Principal Component Analysis in the Presence of Missing Values , 2022 .

[15]  Ismail Uysal,et al.  A probabilistic framework to incorporate mixed-data type features: Matrix factorization with multimodal side information , 2019, Neurocomputing.

[16]  Bamshad Mobasher,et al.  Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .

[17]  Robin Burke,et al.  Securing collaborative filtering against malicious attacks through anomaly detection , 2006, AAAI 2006.

[18]  Sanjeev R. Kulkarni,et al.  Detection of shilling attacks in recommender systems via spectral clustering , 2014, 17th International Conference on Information Fusion (FUSION).

[19]  Robin Burke,et al.  Identifying Attack Models for Secure Recommendation , 2004 .

[20]  Alfred O. Hero,et al.  Multimodal Event Detection in Twitter Hashtag Networks , 2016, Journal of Signal Processing Systems.

[21]  Christopher C. Johnson Logistic Matrix Factorization for Implicit Feedback Data , 2014 .

[22]  Kevin P. Murphy,et al.  Machine learning - a probabilistic perspective , 2012, Adaptive computation and machine learning series.

[23]  Bhaskar Mehta,et al.  Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.

[24]  Bamshad Mobasher,et al.  Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.

[25]  Zhongmin Cai,et al.  Estimating user behavior toward detecting anomalous ratings in rating systems , 2016, Knowl. Based Syst..

[26]  Xiaodong Wang,et al.  Quickest Attack Detection in Multi-Agent Reputation Systems , 2014, IEEE Journal of Selected Topics in Signal Processing.

[27]  John Riedl,et al.  Influence in Ratings-Based Recommender Systems: An Algorithm-Independent Approach , 2005, SDM.

[28]  M. Baker Statisticians issue warning over misuse of P values , 2016, Nature.

[29]  Bin Fang,et al.  A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique , 2015, Inf. Sci..

[30]  David A. Clifton,et al.  A review of novelty detection , 2014, Signal Process..

[31]  Bamshad Mobasher,et al.  Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.

[32]  Yuhong Liu,et al.  Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis , 2010, 2010 IEEE Second International Conference on Social Computing.

[33]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[34]  Ruslan Salakhutdinov,et al.  Probabilistic Matrix Factorization , 2007, NIPS.

[35]  David M. Blei,et al.  Bayesian Nonparametric Poisson Factorization for Recommendation Systems , 2014, AISTATS.

[36]  Zongben Xu,et al.  Re-scale AdaBoost for attack detection in collaborative filtering recommender systems , 2015, Knowl. Based Syst..

[37]  Ismail Uysal,et al.  Quick and accurate attack detection in recommender systems through user attributes , 2019, RecSys.

[38]  Hao Chen,et al.  Sequential change-point detection based on nearest neighbors , 2016, The Annals of Statistics.

[39]  Martha Larson,et al.  Collaborative Filtering beyond the User-Item Matrix , 2014, ACM Comput. Surv..

[40]  Padraig Cunningham,et al.  Unsupervised retrieval of attack profiles in collaborative recommender systems , 2008, RecSys '08.

[41]  Peng Zhang,et al.  UD-HMM: An unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering , 2018, Knowl. Based Syst..

[42]  Yan Tang,et al.  An effective recommender attack detection method based on time SFM factors , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[43]  Michael I. Jordan,et al.  Graphical Models, Exponential Families, and Variational Inference , 2008, Found. Trends Mach. Learn..

[44]  Sanjeev R. Kulkarni,et al.  Graph-based detection of shilling attacks in recommender systems , 2013, 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP).

[45]  Gunnar Rätsch,et al.  Constructing Boosting Algorithms from SVMs: An Application to One-Class Classification , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[46]  Michèle Basseville,et al.  Detection of abrupt changes: theory and application , 1993 .

[47]  Konstantina Christakopoulou,et al.  Adversarial attacks on an oblivious recommender , 2019, RecSys.

[48]  Mohammad Emtiyaz Khan,et al.  Variational bounds for mixed-data factor analysis , 2010, NIPS.

[49]  Wolfgang Nejdl,et al.  Preventing shilling attacks in online recommender systems , 2005, WIDM '05.