Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation
- 569 Downloads
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems and their reliance on user-specified judgments for building profiles. Attackers can easily introduce biased data in an attempt to force the system to “adapt” in a manner advantageous to them. Our research in secure personalization is examining a range of attack models, from the simple to the complex, and a variety of recommendation techniques. In this chapter, we explore an attack model that focuses on a subset of users with similar tastes and show that such an attack can be highly successful against both user-based and item-based collaborative filtering. We also introduce a detection model that can significantly decrease the impact of this attack.
KeywordsRecommender System Target Item Recommendation Algorithm Attack Model Average Attack
Unable to display preview. Download preview PDF.
- 1.Burke, R., Mobasher, B., Zabicki, R., Bhaumik, R.: Identifying attack models for secure recommendation. In: Beyond Personalization: A Workshop on the Next Generation of Recommender Systems, San Diego, California (2005)Google Scholar
- 2.Burke, R., Mobasher, B., Bhaumik, R.: Limited knowledge shilling attacks in collaborative filtering systems. In: Proceedings of the 3rd IJCAI Workshop in Intelligent Techniques for Personalization, Edinburgh, Scotland (2005)Google Scholar
- 3.Lam, S., Reidl, J.: Shilling recommender systems for fun and profit. In: Proceedings of the 13th International WWW Conference, New York (2004)Google Scholar
- 5.Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th International World Wide Web Conference, Hong Kong (2001)Google Scholar
- 7.Su, X.F., Zeng, H.J., Chen, Z.: Finding group shilling in recommendation system. In: Proceedings of the 14th international World Wide Web Conference, WWW 2005 (2005)Google Scholar
- 8.OMahony, M., Hurley, N., Silvestre, G.: Utility-based neighbourhood formation for efficient and robust collaborative filtering. In: Proceedings of the 5th ACM Conference on Electronic Commerce (EC 2004), pp. 260–261 (2004)Google Scholar
- 9.Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Effective attack models for shilling item-based collaborative filtering systems. In: Proceedings of the 2005 WebKDD Workshop, held in conjuction with ACM SIGKDD 2005, Chicago, Illinois (2005)Google Scholar
- 10.Herlocker, J., Konstan, J., Borchers, A., Riedl, J.: An algorithmic frame work for performing collaborative filtering. In: Proceedings of the 22nd ACM Conference on Research and Development in Information Retrieval (SIGIR 1999), Berkeley, CA (1999)Google Scholar