A New Mechanism for Detecting Shilling Attacks in Recommender Systems Based on Social Network Analysis and Gaussian Rough Neural Network with Emotional Learning

Document Type : Original Article

Authors

Department of Industrial Engineering, K. N. Toosi University of Technology, Tehran, Iran

Abstract

A recommender system is an integral part of any e-commerce site. Shilling attacks are among essential challenges in recommender systems, which use the creation of fake profiles in the system and biased rating of items, causing the accuracy to decrease and the correct performance of the recommender system in providing recommendations to users. The target of attackers is to change the rank of content or items corresponded to their interests. Shilling attacks are a threat to the credibility of recommender systems. Therefore, detecting shilling attacks it necessary to in recommender systems to maintain their fairness and validity. Appropriate algorithms and methods have been so far presented to detect shilling attacks. However, some of these methods either examine the rating matrix from a single point of view or use low-order interactions or high-order interactions. This study aimed to propose a mechanism using users' rating matrix, rating time, and social network analysis output of users' profiles by Gaussian-Rough neural network to simultaneously use low-order and high-order interactions to detect shilling attacks. Finally, several experiments were conducted with three models: mean attack, random attack, and bandwagon attack, and compared with PCA, Semi, BAY, and XGB methods using precision, recall, and F1-Measure. The results indicated that the proposed method is more effective than the comparison methods regarding attack detection and overall detection, which proves the effectiveness of the proposed method.

Keywords

Main Subjects


  1. Bobadilla, J., Ortega, F., Hernando, A. and Gutiérrez, A., "Recommender systems survey", Knowledge-based systems, Vol. 46, (2013), 109-132. doi: 10.1016/j.knosys.2013.03.012.
  2. Resnick, P. and Varian, H.R., "Recommender systems", Communications of the ACM, Vol. 40, No. 3, (1997), 56-58. doi: 10.1145/245108.245121.
  3. Adomavicius, G. and Tuzhilin, A., "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions", IEEE transactions on knowledge and data engineering, Vol. 17, No. 6, (2005), 734-749. doi: 10.1109/TKDE.2005.
  4. Aggarwal, C.C., "Recommender systems, Springer, Vol. 1,  (2016).
  5. Moghaddam, F.B. and Elahi, M., Cold start solutions for recommendation systems, in Big data recommender systems: Recent trends and advances. 2019, IET.
  6. Bollen, D., Knijnenburg, B.P., Willemsen, M.C. and Graus, M., "Understanding choice overload in recommender systems", in Proceedings of the fourth ACM conference on Recommender systems., (2010), 63-70.
  7. Ricci, F., Rokach, L. and Shapira, B., Introduction to recommender systems handbook, in Recommender systems handbook. 2011, Springer.1-35.
  8. Jannach, D., Zanker, M., Felfernig, A. and Friedrich, G., "Recommender systems: An introduction, Cambridge University Press, (2010).
  9. Rubens, N., Elahi, M., Sugiyama, M. and Kaplan, D., Active learning in recommender systems, in Recommender systems handbook. 2015, Springer.809-846.
  10. Su, X. and Khoshgoftaar, T.M., "A survey of collaborative filtering techniques", Advances in Artificial Intelligence, Vol. 2009, (2009). https://doi.org/10.1155/2009/421425
  11. Burke, R., "Hybrid recommender systems: Survey and experiments", User Modeling and User-adapted Interaction, Vol. 12, No. 4, (2002), 331-370.
  12. Alonso, S., Bobadilla, J., Ortega, F. and Moya, R., "Robust model-based reliability approach to tackle shilling attacks in collaborative filtering recommender systems", IEEE Access, Vol. 7, (2019), 41782-41798. doi: 10.1109/ACCESS.2019.2905862.
  13. Kaminskas, M. and Bridge, D., "Diversity, serendipity, novelty, and coverage: A survey and empirical analysis of beyond-accuracy objectives in recommender systems", ACM Transactions on Interactive Intelligent Systems (TiiS), Vol. 7, No. 1, (2016), 1-42. doi: 10.1145/2926720.
  14. Jia, C.-X. and Liu, R.-R., "Improve the algorithmic performance of collaborative filtering by using the interevent time distribution of human behaviors", Physica A: Statistical Mechanics and its Applications, Vol. 436, (2015), 236-245. doi: 10.1016/j.physa.2015.05.060.
  15. Si, M. and Li, Q., "Shilling attacks against collaborative recommender systems: A review", Artificial Intelligence Review, Vol. 53, No. 1, (2020), 291-319. doi: 10.1007/s10462-018-9655-x.
  16. Mobasher, B., Burke, R., Bhaumik, R. and Williams, C., "Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness", ACM Transactions on Internet Technology (TOIT), Vol. 7, No. 4, (2007), 23-es. doi: 10.1145/1278366.1278372.
  17. Burke, R., O’Mahony, M.P. and Hurley, N.J., Robust collaborative recommendation, in Recommender systems handbook. 2015, Springer.961-995.
  18. Williams, C.A., "Thesis: Profile injection attack detection for securing collaborative recommender systems", (2012).
  19. O'Mahony, M.P., Hurley, N.J. and Silvestre, G.C., "Recommender systems: Attack types and strategies", in AAAI., (2005), 334-339.
  20. Bhaumik, R., Williams, C., Mobasher, B. and Burke, R., "Securing collaborative filtering against malicious attacks through anomaly detection", in Proceedings of the 4th workshop on intelligent techniques for web personalization (ITWP’06), Boston. Vol. 6, (2006), 10.
  21. Mobasher, B., Burke, R., Bhaumik, R. and Sandvig, J.J., "Attacks and remedies in collaborative recommendation", IEEE Intelligent Systems, Vol. 22, No. 3, (2007), 56-63. doi: 10.1109/MIS.2007.45.
  22. Yang, Z., Cai, Z. and Guan, X., "Estimating user behavior toward detecting anomalous ratings in rating systems", Knowledge-based Systems, Vol. 111, (2016), 144-158. doi: 10.1016/j.knosys.2016.08.011.
  23. Chung, C.-Y., Hsu, P.-Y. and Huang, S.-H., "Βp: A novel approach to filter out malicious rating profiles from recommender systems", Decision Support Systems, Vol. 55, No. 1, (2013), 314-325. doi: 10.1016/j.dss.2013.01.020.
  24. Rezaimehr, F. and Dadkhah, C., "A survey of attack detection approaches in collaborative filtering recommender systems", Artificial Intelligence Review, Vol. 54, No. 3, (2021), 2011-2066. doi: 10.1007/s10462-020-09898-3.
  25. Chirita, P.-A., Nejdl, W. and Zamfir, C., "Preventing shilling attacks in online recommender systems", in Proceedings of the 7th annual ACM international workshop on Web information and data management., (2005), 67-74.
  26. Lam, S.K. and Riedl, J., "Shilling recommender systems for fun and profit", in Proceedings of the 13th international conference on World Wide Web., (2004), 393-402.
  27. O'Mahony, M.P., Hurley, N.J. and Silvestre, G.C., "Detecting noise in recommender system databases", in Proceedings of the 11th international conference on Intelligent user interfaces., (2006), 109-115.
  28. Mobasher, B., Burke, R., Bhaumik, R. and Williams, C., "Effective attack models for shilling item-based collaborative filtering systems", in Proceedings of the WebKDD Workshop, Citeseer., (2005), 13-23.
  29. Burke, R., Mobasher, B. and Bhaumik, R., "Limited knowledge shilling attacks in collaborative filtering systems", in Proceedings of 3rd international workshop on intelligent techniques for web personalization (ITWP 2005), 19th international joint conference on artificial intelligence (IJCAI 2005)., (2005), 17-24.
  30. Williams, C., Mobasher, B., Burke, R., Sandvig, J. and Bhaumik, R., "Detection of obfuscated attacks in collaborative recommender systems", in Proceedings of the ECAI’06 Workshop on Recommender Systems. Vol. 94, (2006).
  31. Bhaumik, R., Mobasher, B. and Burke, R., "A clustering approach to unsupervised attack detection in collaborative recommender systems", in Proceedings of the International Conference on Data Science (ICDATA), Citeseer. (2011), 1.
  32. Hurley, N., Cheng, Z. and Zhang, M., "Statistical attack detection", in Proceedings of the third ACM conference on Recommender systems., (2009), 149-156.
  33. Wilson, D.C. and Seminario, C.E., "When power users attack: Assessing impacts in collaborative recommender systems", in Proceedings of the 7th ACM conference on Recommender systems., (2013), 427-430.
  34. Seminario, C.E. and Wilson, D.C., "Nuking item-based collaborative recommenders with power items and multiple targets", in The Twenty-Ninth International Flairs Conference. (2016).
  35. Zhang, F., "Analysis of bandwagon and average hybrid attack model against trust-based recommender systems", in 2011 Fifth International Conference on Management of e-Commerce and e-Government, IEEE., (2011), 269-273.
  36. O'Mahony, M., Hurley, N., Kushmerick, N. and Silvestre, G., "Collaborative recommendation: A robustness analysis", ACM Transactions on Internet Technology (TOIT), Vol. 4, No. 4, (2004), 344-377. doi: 10.1145/1031114.1031116.
  37. Mobasher, B., Burke, R. and Sandvig, J.J., "Model-based collaborative filtering as a defense against profile injection attacks", in AAAI. Vol. 6, (2006), 1388.
  38. Dellarocas, C., "Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior", in Proceedings of the 2nd ACM Conference on Electronic Commerce., (2000), 150-157.
  39. O’Mahony, M.P., Hurley, N.J. and Silvestre, G., "Promoting recommendations: An attack on collaborative filtering", in International Conference on Database and Expert Systems Applications, Springer., (2002), 494-503.
  40. Burke, R., Mobasher, B., Williams, C. and Bhaumik, R., "Classification features for attack detection in collaborative recommender systems", in Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining., (2006), 542-547.
  41. Williams, C.A., Mobasher, B. and Burke, R., "Defending recommender systems: Detection of profile injection attacks", Service Oriented Computing and Applications, Vol. 1, No. 3, (2007), 157-170. doi: 10.1007/s11761-007-0013-0.
  42. Tang, T. and Tang, Y., "An effective recommender attack detection method based on time sfm factors", in 2011 IEEE 3rd International Conference on Communication Software and Networks, IEEE., (2011), 78-81.
  43. Xia, H., Fang, B., Gao, M., Ma, H., Tang, Y. and Wen, J., "A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique", Information Sciences, Vol. 306, (2015), 150-165. doi: 10.1016/j.ins.2015.02.019.
  44. Yang, Z., Xu, L., Cai, Z. and Xu, Z., "Re-scale adaboost for attack detection in collaborative filtering recommender systems", Knowledge-based Systems, Vol. 100, (2016), 74-88. doi: 10.1016/j.knosys.2016.02.008.
  45. Wu, Z.-A., Zhuang, Y., Wang, Y.-Q. and Cao, J., "Shilling attack detection based on feature selection for recommendation systems", Acta Electonica Sinica, Vol. 40, No. 8, (2012), 1687. doi: 10.3969/j.issn.0372-2112.2012.08.031.
  46. Li, W., Gao, M., Li, H., Zeng, J., Xiong, Q. and Hirokawa, S., "Shilling attack detection in recommender systems via selecting patterns analysis", IEICE Transactions on Information and Systems, Vol. 99, No. 10, (2016), 2600-2611. doi: 10.1587/transinf.2015EDP7500.
  47. Wu, Z., Wu, J., Cao, J. and Tao, D., "Hysad: A semi-supervised hybrid shilling attack detector for trustworthy product recommendation", in Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining., (2012), 985-993.
  48. Mehta, B., "Unsupervised shilling detection for collaborative filtering", in AAAI., (2007), 1402-1407.
  49. Shao, C. and zhong yi Sun, Y., "Shilling attack detection for collaborative recommender systems: A gradient boosting method", Mathematical Biosciences and Engineering, Vol. 19, No. 7, (2022), 7248-7271. doi: 10.3934/mbe.2022342.
  50. Ajzen, I., "The theory of planned behavior", Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, (1991), 179-211. doi: 10.1016/0749-5978(91)90020-T.
  51. Zhou, W., Koh, Y.S., Wen, J., Alam, S. and Dobbie, G., "Detection of abnormal profiles on group attacks in recommender systems", in Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval., (2014), 955-958.
  52. Zhou, W., Wen, J., Koh, Y.S., Alam, S. and Dobbie, G., "Attack detection in recommender systems based on target item analysis", in 2014 International Joint Conference on Neural Networks (IJCNN), IEEE., (2014), 332-339.
  53. Zhou, W., Wen, J., Koh, Y.S., Xiong, Q., Gao, M., Dobbie, G. and Alam, S., "Shilling attacks detection in recommender systems based on target item analysis", PloS One, Vol. 10, No. 7, (2015), e0130968. doi: 10.1371/journal.pone.0130968.
  54. Zhang, S., Chakrabarti, A., Ford, J. and Makedon, F., "Attack detection in time series for recommender systems", in Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining., (2006), 809-814.
  55. Oestreicher-Singer, G. and Sundararajan, A., "Recommendation networks and the long tail of electronic commerce", Mis Quarterly, (2012), 65-83. doi: 10.2139/ssrn.1324064.
  56. Kong, X., Shi, Y., Yu, S., Liu, J. and Xia, F., "Academic social networks: Modeling, analysis, mining and applications", Journal of Network and Computer Applications, Vol. 132, (2019), 86-103. doi: 10.1016/j.jnca.2019.01.029.
  57. Liao, H., Ding, S., Wang, M. and Ma, G., "An overview on rough neural networks", Neural Computing and Applications, Vol. 27, No. 7, (2016), 1805-1816. doi: 10.1007/s00521-015-2009-6.
  58. Salehi, S. and Pouyan, A., "Detecting overlapping communities in social networks using deep learning", International Journal of Engineering, Transactions C: Aspects Vol. 33, No. 3, (2020), 366-376. doi: 10.5829/IJE.2020.33.03C.01.
  59. Harper, F.M. and Konstan, J.A., "The movielens datasets: History and context", ACM Transactions on Interactive Intelligent Systems (TiiS), Vol. 5, No. 4, (2015), 1-19.
  60. Cao, J., Wu, Z., Mao, B. and Zhang, Y., "Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system", World Wide Web, Vol. 16, No. 5, (2013), 729-748. https://doi.org/10.1007/s11280-012-0164-6
  61. Bhebe, W. and Kogeda, O.P., "Shilling attack detection in collaborative recommender systems using a meta learning strategy", in 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), IEEE., (2015), 56-61.