首页> 外文期刊>Neurocomputing >SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems
【24h】

SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems

机译:SVM-TIA是一种基于SVM和推荐项目的目标项目分析的先兆攻击检测方法

获取原文
获取原文并翻译 | 示例
           

摘要

Due to the open nature of recommender systems, collaborative recommender systems are vulnerable to profile injection attacks, in which malicious users inject attack profiles into the rating matrix in order to bias the systems' ranking list. Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Most of previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles of an attack. There also exist class unbalance problems in supervised detecting methods, the detecting performance is not as good when the amount of samples of attack profiles in training set is smaller. In this paper, we study the use of SVM based method and group characteristics in attack profiles. A two phase detecting method SVM-TIA is proposed based on these two methods. In the first phase, Borderline-SMOTE method is used to alleviate the class unbalance problem in classification; a rough detecting result is obtained in this phase; the second phase is a fine-tuning phase whereby the target items in the potential attack profiles set are analyzed. We conduct tests on the MovieLens 100 K Dataset and compare the performance of SVM-TIA with other shilling detecting methods to demonstrate the effectiveness of the proposed approach. (C) 2016 Elsevier B.V. All rights reserved.
机译:由于推荐系统的开放性,协作推荐系统容易受到配置文件注入攻击,其中恶意用户将攻击配置文件注入评级矩阵中,以使系统的排名列表有偏差。推荐系统极易受到个人和团体的先令攻击。以前的大多数研究都只关注真实配置文件和攻击配置文件之间的差异,而忽略了攻击的攻击配置文件中的组特征。监督检测方法中还存在类不平衡问题,训练集中的攻击轮廓样本数量较小时,检测性能不佳。在本文中,我们研究了基于SVM的方法和攻击特征中的组特征。基于这两种方法,提出了一种两相检测方法SVM-TIA。在第一阶段,使用Borderline-SMOTE方法缓解分类中的类不平衡问题。在该阶段获得了粗略的检测结果。第二阶段是微调阶段,通过该阶段分析潜在攻击配置文件集中的目标项目。我们对MovieLens 100 K数据集进行测试,并将SVM-TIA与其他先验检测方法的性能进行比较,以证明所提出方法的有效性。 (C)2016 Elsevier B.V.保留所有权利。

著录项

  • 来源
    《Neurocomputing》 |2016年第19期|197-205|共9页
  • 作者单位

    Chongqing Univ, Coll Comp Sci, Chongqing, Peoples R China;

    Chongqing Univ, Coll Comp Sci, Chongqing, Peoples R China|Chongqing Univ, Sch Software Engn, Chongqing, Peoples R China;

    Chongqing Univ, Sch Software Engn, Chongqing, Peoples R China;

    Chongqing Univ, Sch Software Engn, Chongqing, Peoples R China;

    Chongqing Univ, Sch Software Engn, Chongqing, Peoples R China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Recommender system; Shilling attack detection; Unbalanced data; SVM; Target item analysis;

    机译:推荐系统;先发攻击检测;不平衡数据;支持向量机;目标项目分析;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号