Shilling Attack Detection-A New Approach for a Trustworthy Recommender System

Cited 65 time in webofscience Cited 0 time in scopus
  • Hit : 3
  • Download : 0
Recommender systems rely on the opinions of many users to predict the preferences of potential customers. These systems have been broadly used to make quality recommendations to increase sales. However, recommender systems are vulnerable to even small data inputs of malicious information. Inappropriate products can be offered to users by injecting a few unscrupulous "shilling" profiles into the recommender system. This research proposes to identify a cluster of profiles by focusing on "filler" ratings. We examine a number of properties of such profiles, followed by empirical evidence and detailed analysis of various characteristics of the shilling attacks. We then propose a hybrid two-phase procedure for shilling attack detection. First, a multidimensional scaling approach is adopted to identify distinct behaviors that help to detect and secure the recommendation activities. Clustering-based methods are subsequently proposed to discriminate attack users. Experimental studies are conducted to show the effectiveness of the proposed method.
Publisher
INFORMS
Issue Date
2012
Language
English
Article Type
Article
Citation

INFORMS JOURNAL ON COMPUTING, v.24, no.1, pp.117 - 131

ISSN
1091-9856
DOI
10.1287/ijoc.1100.0440
URI
http://hdl.handle.net/10203/322776
Appears in Collection
IE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 65 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0