skip to main content
Article

Analysis of a low-dimensional linear model under recommendation attacks

Published: 06 August 2006 Publication History

Abstract

Collaborative filtering techniques have become popular in the past decade as an effective way to help people deal with information overload. Recent research has identified significant vulnerabilities in collaborative filtering techniques. Shilling attacks, in which attackers introduce biased ratings to influence recommendation systems, have been shown to be effective against memory-based collaborative filtering algorithms. We examine the effectiveness of two popular shilling attacks (the random attack and the average attack) on a model-based algorithm that uses Singular Value Decomposition (SVD) to learn a low-dimensional linear model. Our results show that the SVD-based algorithm is much more resistant to shilling attacks than memory-based algorithms. Furthermore, we develop an attack detection method directly built on the SVD-based algorithm and show that this method detects random shilling attacks with high detection rates and very low false alarm rates.

References

[1]
Y. Azar, A. Fiat, A. Karlin, F. McSherry, and J. Saia. Spectral analysis of data. In Proceedings of the 33rd ACM Symposium on Theory of Computing pages 619--626, 2001.
[2]
D. Billsus and M. J. Pazzani. Learning collaborative information filters. In Proceedings of the 15th International Conference on Machine Learning pages 46--54, 1998.
[3]
M. Brand. Fast online SVD revisions for lightweight recommender system. In Proceedings of the 3rd SIAM International Conference on Data Mining 2003.
[4]
R. Burke, B. Mobasher, R. Bhaumik, and C. Williams. Segment-based injection attacks against collaborative filtering recommender systems. In Proceedings of the International Conference on Data Mining (ICDM) pages 577--580, 2005.
[5]
J. Canny. Collaborative filtering with privacy via factor analysis. In Proceedings of the 25th ACM SIGIR Conference pages 45--57, 2002.
[6]
K. Goldberg, T. Roeder, D. Gupta, and C. Perkins. Eigentaste: A constant time collaborative filtering algorithm. Information Retrieval 4(2) : 133--151, 2001.
[7]
G. Golub and C. V. Loan. Matrix Computations (3rd edition) Johns Hopkins University Press, 1996.
[8]
J. L. Herlocker, J. A. Konstan, A. Borchers, and J. Riedl. An algorithmic framework for performing collaborative filtering. In Proceedings of the 22nd ACM SIGIR Conference pages 230--237, 1999.
[9]
T. Hofmann. Latent semantic models for collaborative filtering. ACM Transaction on Information Systems 22(1) : 89--115, 2004.
[10]
S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In Proceedings of the 13th WWW Conference pages 393--402, 2004.
[11]
B. Marlin. Modeling user rating profiles for collaborative filtering. In Proceedings of the 17th Annual Conference on Neural Information Processing Systems 2003.
[12]
B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Effective attack models for shilling item-based collaborative filtering systems. In Proceedings of the WebKDD Workshop 2005.
[13]
M. O 'Mahony, N. Hurley, N. Kushmerick, and G. Silvestre. Collaborative recommendation: A robust analysis. ACM Transactions on Internet Technology 4(4) : 344--377, 2004.
[14]
D. M. Pennock, E. Horvitz, S. Lawrence, and C. L. Giles. Collaborative filtering by personality diagnosis: A hybrid memory and model-based approach. In Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence pages 473--480, 2000.
[15]
P. Resnick, N. Iacovou, M. Suchak, P. Bergstorm, and J. Riedl. GroupLens: An Open Architecture for Collaborative Filtering of Netnews. In Proceedings of ACM Conference on Computer Supported Cooperative Work pages 175--186, 1994.
[16]
B. M. Sarwar, G. Karypis, J. A. Konstan, and J. Riedl. Application of dimensionality reduction in recommender systems - a case study. In ACM WebKDD Web Mining for E-Commerce Workshop 2000.
[17]
B. M. Sarwar, G. Karypis, J. A. Konstan, and J. Riedl. Item-based collaborative filtering recommendation algorithms. In Proceedings of the 10th WWW Conference pages 285--295, 2001.
[18]
A. I. Schein, A. Popescul, L. H. Ungar, and D. M. Pennock. Methods and metrics for cold-start recommendations. In Proceedings of the 25th ACM SIGIR Conference pages 253--260, 2002.
[19]
N. Srebro and T. Jaakkola. Weighted low rank approximation. In Proceedings of the 20th International Conference on Machine Learning pages 720--727, 2003.
[20]
S. Zhang, W. Wang, J. Ford, F. Makedon, and J. Pearlman. Using singular value decomposition approximation for collaborative filtering. In Proceedings of the 7th IEEE Conference on E-commerce pages 257--264, 2005.

Cited By

View all
  • (2023)Detecting Group Shilling Profiles in Recommender Systems: A Hybrid Clustering and Grey Wolf Optimizer TechniqueDesign and Applications of Nature Inspired Optimization10.1007/978-3-031-17929-7_7(133-161)Online publication date: 3-Jan-2023
  • (2022)Improving Deep Learning-Based Recommendation Attack Detection Using Harris Hawks OptimizationApplied Sciences10.3390/app12191013512:19(10135)Online publication date: 9-Oct-2022
  • (2019)Robust Model-Based Reliability Approach to Tackle Shilling Attacks in Collaborative Filtering Recommender SystemsIEEE Access10.1109/ACCESS.2019.29058627(41782-41798)Online publication date: 2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGIR '06: Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
August 2006
768 pages
ISBN:1595933697
DOI:10.1145/1148170
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 August 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. collaborative filtering
  3. recommender systems
  4. shilling attacks

Qualifiers

  • Article

Conference

SIGIR06
Sponsor:
SIGIR06: The 29th Annual International SIGIR Conference
August 6 - 11, 2006
Washington, Seattle, USA

Acceptance Rates

Overall Acceptance Rate 792 of 3,983 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Detecting Group Shilling Profiles in Recommender Systems: A Hybrid Clustering and Grey Wolf Optimizer TechniqueDesign and Applications of Nature Inspired Optimization10.1007/978-3-031-17929-7_7(133-161)Online publication date: 3-Jan-2023
  • (2022)Improving Deep Learning-Based Recommendation Attack Detection Using Harris Hawks OptimizationApplied Sciences10.3390/app12191013512:19(10135)Online publication date: 9-Oct-2022
  • (2019)Robust Model-Based Reliability Approach to Tackle Shilling Attacks in Collaborative Filtering Recommender SystemsIEEE Access10.1109/ACCESS.2019.29058627(41782-41798)Online publication date: 2019
  • (2019)From similarity perspectiveFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-017-6566-y13:2(231-246)Online publication date: 1-Apr-2019
  • (2018)Shilling attack detection for recommender systems based on credibility of group users and rating time seriesPLOS ONE10.1371/journal.pone.019653313:5(e0196533)Online publication date: 9-May-2018
  • (2018)A Fuzzy Linguistic Approach-Based Non-malicious Noise Detection Algorithm for Recommendation SystemInternational Journal of Fuzzy Systems10.1007/s40815-018-0508-120:8(2368-2382)Online publication date: 9-Jul-2018
  • (2018)A Comparative Study on Shilling Detection Methods for Trustworthy RecommendationsJournal of Systems Science and Systems Engineering10.1007/s11518-018-5374-827:4(458-478)Online publication date: 19-Jul-2018
  • (2018)Shilling attacks against collaborative recommender systems: a reviewArtificial Intelligence Review10.1007/s10462-018-9655-xOnline publication date: 19-Sep-2018
  • (2017)Detection of profile injection attacks in social recommender systems using outlier analysis2017 IEEE International Conference on Big Data (Big Data)10.1109/BigData.2017.8258235(2714-2719)Online publication date: Dec-2017
  • (2017)Abnormal Group User Detection in Recommender Systems Using Multi-dimension Time SeriesCollaborate Computing: Networking, Applications and Worksharing10.1007/978-3-319-59288-6_34(373-383)Online publication date: 5-Jul-2017
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media