首页> 外文会议>2015 International Conference on Emerging Trends in Networks and Computer Communications >Shilling attack detection in Collaborative Recommender Systems using a Meta Learning strategy
【24h】

Shilling attack detection in Collaborative Recommender Systems using a Meta Learning strategy

机译:使用元学习策略的协作推荐系统中的先令攻击检测

获取原文
获取原文并翻译 | 示例

摘要

Collaborative Recommender Systems suggest items to a user based on other users past behaviour (items they once bought, viewed or selected and/or ratings they gave to those items). They are very effective in generating meaningful recommendations to a group of users for products or items that might interest them. However, since Collaborative filtering techniques depend on outside sources of information they are susceptible to profile injection attacks popularly known as shilling attacks. Shilling is a process in which syndicating users can connive to promote or demote a certain item. These mischievous users can consciously inject shilling profiles in an effort to bias the recommender system to their advantage. In this paper we seek to understand the degree to which shilling attacks can harm recommender systems and how these attacks can be detected. Firstly, we evaluate the vulnerabilities of collaborative filtering techniques in providing reliable recommendations. We study various attack strategies that manipulators use to attack recommender systems. Secondly we investigate the most suitable features that can be used to adequately identify shilling attacks. We propose the combiner strategy that combines multiple classifiers in an effort to detect shilling attacks. The diversity measure is used to determine the most suitable combination of classifiers. In this paper, we made use k-Nearest Neighbour, Support Vector Machines and Bayesian Networks as the initial base classifiers. The Naïve Bayes was used as a Meta Classifier. The proposed Meta-Learning classifier gave an overall performance of 99% and was found to be more superior to Neural Networks and k-Nearest Neighbor.
机译:协作推荐系统根据其他用户的过去行为(他们曾经购买,查看或选择的项目和/或对这些项目的评级)向用户建议项目。它们对于为一组用户可能感兴趣的产品或项目生成有意义的建议非常有效。但是,由于协作过滤技术依赖于外部信息源,因此它们容易受到配置文件注入攻击(通常称为先令攻击)。先令是一个过程,在此过程中,辛迪加用户可以自愿提升或降级特定项目。这些顽皮的用户可以有意识地注入先令信息,以使推荐系统偏向于他们的优势。在本文中,我们试图了解先令攻击会损害推荐系统的程度以及如何检测到这些攻击。首先,我们评估了协作过滤技术在提供可靠建议方面的漏洞。我们研究了操纵器用来攻击推荐系统的各种攻击策略。其次,我们研究可用于充分识别先令攻击的最合适的功能。我们提出了组合策略,将多个分类器组合在一起,以检测先令攻击。分集度量用于确定最合适的分类器组合。在本文中,我们使用k最近邻,支持向量机和贝叶斯网络作为初始基础分类器。朴素贝叶斯被用作元分类器。拟议的元学习分类器给出了99%的整体性能,并且被发现比神经网络和k最近邻居更好。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号