Evaluating Prediction Error for Anomaly Detection by Exploiting Matrix Factorization in Rating Systems

A rating system provides rating data about products or services, which is a key feature of e-commerce websites such as Amazon, TripAdvisor, and so on. In reality, rating systems generally suffer from threats of profile injection attacks or anomalous ratings due to the integration of collaborative recommendation techniques. To reduce these risks, a number of detection methods have been developed for defending such potential threats. However, they either directly calculate similarity between users or items to recognize attack profiles and genuine profiles, or utilize supervised learning methods by extracting features from user profiles for anomaly detection. In this paper, we propose a stepwise detection method to spot anomalous ratings or attacks, which bypasses the hard problems of similarity calculation and feature extraction. First, a part of samples are randomly selected from original user profiles for constructing a sub-matrix (rating matrix). A fast max-margin matrix factorization is then employed to make rating prediction. After that, suspected items can be captured by comprehensively analyzing both the distributions of mean prediction errors of items and users. Finally, anomalous ratings and potential attackers can be directly returned. Extensive experiments on MovieLens-100K data set demonstrate the effectiveness of the proposed approach compared with benchmarked methods. It is noteworthy that suspected items on a large-scale real-world data set, Amazon data, are detected by the proposed method and further analyzed from diverse perspectives, including rating distribution, rating intention, and time series analysis.

[1]  Christos Faloutsos,et al.  Robust multivariate autoregression for anomaly detection in dynamic product ratings , 2014, WWW.

[2]  Bamshad Mobasher,et al.  Detecting Profile Injection Attacks in Collaborative Filtering: A Classification-Based Approach , 2006, WEBKDD.

[3]  Baoxu Liu,et al.  Attack Detection by Rough Set Theory in Recommendation System , 2010, 2010 IEEE International Conference on Granular Computing.

[4]  Xiangliang Zhang,et al.  Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering , 2013, Journal of Computer Science and Technology.

[5]  Wolfgang Nejdl,et al.  Preventing shilling attacks in online recommender systems , 2005, WIDM '05.

[6]  Lu Yu,et al.  TIIREC: A tensor approach for tag-driven item recommendation with sparse user generated content , 2017, Inf. Sci..

[7]  Bhaskar Mehta Unsupervised Shilling Detection for Collaborative Filtering , 2007, AAAI.

[8]  R. Gray,et al.  Language-tree divergence times support the Anatolian theory of Indo-European origin , 2003, Nature.

[9]  Fuzhi Zhang,et al.  HHT-SVM: An online method for detecting profile injection attacks in collaborative recommender systems , 2014, Knowl. Based Syst..

[10]  Zhigang Luo,et al.  Detection of shilling attacks in collaborative filtering recommender systems , 2011, 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR).

[11]  Gillian Dobbie,et al.  Detection of abnormal profiles on group attacks in recommender systems , 2014, SIGIR.

[12]  Bamshad Mobasher,et al.  Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks , 2006, AAAI.

[13]  Jun Zhu,et al.  Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction , 2012, 2014 IEEE International Conference on Data Mining.

[14]  Mehdi Shajari,et al.  Defending recommender systems by influence analysis , 2013, Information Retrieval.

[15]  Carlos E. Seminario,et al.  Accuracy and robustness impacts of power user attacks on collaborative recommender systems , 2013, RecSys.

[16]  Jong-Seok Lee,et al.  Shilling Attack Detection - A New Approach for a Trustworthy Recommender System , 2012, INFORMS J. Comput..

[17]  Fillia Makedon,et al.  Attack detection in time series for recommender systems , 2006, KDD '06.

[18]  Bin Fang,et al.  A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique , 2015, Inf. Sci..

[19]  Sheng Huang,et al.  A Hybrid Decision Approach to Detect Profile Injection Attacks in Collaborative Recommender Systems , 2012, ISMIS.

[20]  Bamshad Mobasher,et al.  Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation , 2005, WEBKDD.

[21]  Gillian Dobbie,et al.  Attack detection in recommender systems based on target item analysis , 2014, 2014 International Joint Conference on Neural Networks (IJCNN).

[22]  Chengqi Zhang,et al.  Noisy but non-malicious user detection in social recommender systems , 2012, World Wide Web.

[23]  Huseyin Polat,et al.  Shilling attacks against recommender systems: a comprehensive survey , 2014, Artificial Intelligence Review.

[24]  Sanjeev R. Kulkarni,et al.  Graph-based detection of shilling attacks in recommender systems , 2013, 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP).

[25]  Zunping Cheng,et al.  Statistical attack detection , 2009, RecSys '09.

[26]  Thomas Hofmann,et al.  Lies and propaganda: detecting spam users in collaborative filtering , 2007, IUI '07.

[27]  David C. Wilson,et al.  Attacking item-based recommender systems with power items , 2014, RecSys '14.

[28]  David C. Wilson,et al.  Assessing Impacts of a Power User Attack on a Matrix Factorization Collaborative Recommender System , 2014, FLAIRS.

[29]  Huseyin Polat,et al.  A Novel Shilling Attack Detection Method , 2014, ITQM.

[30]  Sanjeev R. Kulkarni,et al.  Detection of shilling attacks in recommender systems via spectral clustering , 2014, 17th International Conference on Information Fusion (FUSION).

[31]  Junhao Wen,et al.  SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems , 2016, Neurocomputing.

[32]  Gillian Dobbie,et al.  Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis , 2015, PloS one.

[33]  Anton van den Hengel,et al.  Image-Based Recommendations on Styles and Substitutes , 2015, SIGIR.

[34]  Jie Cao,et al.  A comparative study of shilling attack detectors for recommender systems , 2015, 2015 12th International Conference on Service Systems and Service Management (ICSSSM).

[35]  Christos Faloutsos,et al.  Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution , 2014, KDD.

[36]  W. Cleveland,et al.  Locally Weighted Regression: An Approach to Regression Analysis by Local Fitting , 1988 .

[37]  Bo Zhang,et al.  Fast Max-Margin Matrix Factorization with Data Augmentation , 2013, ICML.

[38]  Bamshad Mobasher,et al.  Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.

[39]  Bamshad Mobasher,et al.  Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.

[40]  Zheng Chen,et al.  Finding group shilling in recommendation system , 2005, WWW '05.

[41]  Yiqun Liu,et al.  Catch the Black Sheep: Unified Framework for Shilling Attack Detection Based on Fraudulent Action Propagation , 2015, IJCAI.

[42]  Yanchun Zhang,et al.  Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system , 2013, World Wide Web.

[43]  Jun Zhu,et al.  Discriminative infinite latent feature models , 2013, 2013 IEEE China Summit and International Conference on Signal and Information Processing.

[44]  Chong-kwon Kim,et al.  PSD: Practical Sybil detection schemes using stickiness and persistence in online recommender systems , 2014, Inf. Sci..

[45]  Rob J Hyndman,et al.  A state space framework for automatic forecasting using exponential smoothing methods , 2002 .

[46]  Shih-Hsiang Huang,et al.  βPβP: A novel approach to filter out malicious rating profiles from recommender systems , 2013, Decis. Support Syst..

[47]  Jie Cao,et al.  A survey on shilling attack models and detection techniques for recommender systems , 2014 .

[48]  Bhaskar Mehta,et al.  Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.

[49]  Jure Leskovec,et al.  Inferring Networks of Substitutable and Complementary Products , 2015, KDD.

[50]  Richard S. Zemel,et al.  The multiple multiplicative factor model for collaborative filtering , 2004, ICML.

[51]  Padraig Cunningham,et al.  Unsupervised retrieval of attack profiles in collaborative recommender systems , 2008, RecSys '08.

[52]  Chuang Liu,et al.  Multi-linear interactive matrix factorization , 2014, Knowl. Based Syst..

[53]  Junjie Wu,et al.  HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation , 2012, KDD.

[54]  John Riedl,et al.  Shilling recommender systems for fun and profit , 2004, WWW '04.

[55]  David C. Wilson,et al.  Evil Twins: Modeling Power Users in Attacks on Recommender Systems , 2014, UMAP.

[56]  Petar M. Djuric,et al.  An MCMC sampling approach to estimation of nonstationary hidden Markov models , 2002, IEEE Trans. Signal Process..

[57]  Fuzhi Zhang,et al.  A Meta-learning-based Approach for Detecting Profile Injection Attacks in Collaborative Recommender Systems , 2012, J. Comput..

[58]  Bamshad Mobasher,et al.  Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .

[59]  David C. Wilson,et al.  Mitigating Power User Attacks on a User-Based Collaborative Recommender System , 2015, FLAIRS.