首页> 外文会议>International Conference on Computational Intelligence Modeling Techniques and Applications >Detection of Profile-injection attacks in Recommender Systems using Outlier Analysis
【24h】

Detection of Profile-injection attacks in Recommender Systems using Outlier Analysis

机译:使用异常分析检测推荐系统中的轮廓注入攻击

获取原文

摘要

E-Commerce recommender systems are vulnerable to different types of profile-injection attacks where a number of fake user profiles are inserted into the system to influence the recommendations made to the users. In this paper, we have proposed three strategies of detecting such attacks with the help of outlier analysis. In all these strategies, the attack-profiles are considered as outliers in the user rating dataset. Firstly, we have used Partition around Medoid (PAM) clustering algorithm in detecting the attack-profiles. An incremental version of the PAM algorithm has been applied and tested for evaluating the performance of the system in identifying the attack profiles when they come into the system. Experiments show that though PAM is able to detect attack profiles with larger number of filler items very well, a percentage of attack profiles with smaller number of filler items is not included in outlier clusters-they are included in large clusters. Secondly, we have applied a PAM-based outlier detection algorithm to find these attack profiles in large clusters. Finally, an angle based outlier detection strategy is used for finding attack profiles in the database under attack.
机译:电子商务推荐系统容易受到不同类型的配置文件注入攻击,其中将许多假用户配置文件插入系统中以影响向用户提出的建议。在本文中,我们提出了在异常分析的帮助下检测这种攻击的三个策略。在所有这些策略中,攻击配置文件被视为用户评级数据集中的异常值。首先,我们在检测到攻击配置文件时使用围绕myode(pam)聚类算法的分区。 PAM算法的增量版本已应用和测试,以便评估系统的性能,以便在进入系统时识别攻击配置文件。实验表明,虽然PAM能够评测具有较大数量的填充物品的攻击曲线,但是较少数量的填充物品的攻击配置文件不包括在异常集群中 - 它们包含在大型群集中。其次,我们已经应用了基于PAM的异常检测算法,可以在大集群中找到这些攻击配置文件。最后,基于角度的异常值检测策略用于在攻击下的数据库中查找攻击配置文件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号