Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation

نویسندگان

  • Bamshad Mobasher
  • Robin D. Burke
  • Chad Williams
  • Runa Bhaumik
چکیده

Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems and their reliance on user-specified judgments for building profiles. Attackers can easily introduce biased data in an attempt to force the system to “adapt” in a manner advantageous to them. Our research in secure personalization is examining a range of attack models, from the simple to the complex, and a variety of recommendation techniques. In this chapter, we explore an attack model that focuses on a subset of users with similar tastes and show that such an attack can be highly successful against both user-based and item-based collaborative filtering. We also introduce a detection model that can significantly decrease the impact of this attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Segment-Focused Shilling Attacks against Recommendation Algorithms in Binary Ratings-based Recommender Systems

As one of the most successful approaches to building recommender systems, collaborative filtering (CF) uses the known preferences of a group of users to make recommendations or predictions of the unknown preferences for other users. However, the open nature of collaborative filtering recommender systems allows attackers who inject biased profile data to have a significant impact on the recommen...

متن کامل

A Survey of Collaborative Recommendation and the Robustness of Model-Based Algorithms

The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-based collaborative filtering algorithms, such as k-nearest neighbor, are quite vulnerable to profile injection attacks. Previous work has shown that some model-based techniques are more robust than standard k-nn. Mode...

متن کامل

Shilling Attacks against Privacy-Preserving Collaborative Filtering

Although collaborative filtering with privacy schemes protect individual user privacy while still providing accurate recommendations, they might be subject to shilling attacks like traditional schemes without privacy. There are various studies focusing on either proposing privacypreserving collaborative filtering schemes or developing robust recommendation algorithms against shilling attacks. H...

متن کامل

Special Issue on Recommendation and Search in Social Systems

The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-based collaborative filtering algorithms, such as k-nearest neighbor, are quite vulnerable to profile injection attacks. Previous work has shown that some model-based techniques are more robust than standard k-nn. Mode...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005