Temporal Defenses for Robust Recommendations

نویسندگان

  • Neal Lathia
  • Stephen Hailes
  • Licia Capra
چکیده

Recommender systems are vulnerable to attack: malicious users may deploy a set of sybils to inject ratings in order to damage or modify the output of Collaborative Filtering (CF) algorithms. To protect against these attacks, previous work focuses on designing sybil profile classification algorithms, whose aim is to find and isolate sybils. These methods, however, assume that the full sybil profiles have already been input to the system. Deployed recommender systems, on the other hand, operate over time, and recommendations may be damaged while sybils are still injecting their profiles, rather than only after all malicious ratings have been input. Furthermore, system administrators do not know when their system is under attack, and thus when to run these classification techniques, thus risking to leave their recommender system vulnerable to attacks. In this work, we address the problem of temporal sybil attacks, and propose and evaluate methods for monitoring global, user and item behaviour over time, in order to detect rating anomalies that reflect an ongoing attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing Robust Project Scheduling Methods for Uncertain Parameters

A common problem arising in project management is the fact that the baseline schedule is often disrupted during the project execution because of uncertain parameters. As a result, project managers are often unable to meet the deadline time of the milestones. Robust project scheduling is an effective approach in case of uncertainty. Upon adopting this approach, schedules are protected against po...

متن کامل

Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity

Active cyber defenses based on temporal platform diversity have been proposed as way to make systems more resistant to attacks. These defenses change the properties of the platforms in order to make attacks more complicated. Unfortunately, little work has been done on measuring the effectiveness of these defenses. In this work, we use four different approaches to quantitatively analyze these de...

متن کامل

MagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples

MagNet and “Efficient Defenses...” were recently proposed as a defense to adversarial examples. We find that we can construct adversarial examples that defeat these defenses with only a slight increase in distortion.

متن کامل

A Novel Method for Measuring the Quality of Temporal Integration in Public Transport Systems

Temporal coordination of services, as a crucial aspect of integration in public transport systems, has always been a big concern for transit planners and schedulers. One of the major issues in the way of coordinating transit services is the lack of a robust measure of effectiveness for assessing the quality of temporal coordination in public transport systems. Even though the network-wide summa...

متن کامل

Reed Warbler Hosts Fine-Tune their Defenses to Track Three Decades of Cuckoo Decline

Interactions between avian hosts and brood parasites can provide a model for how animals adapt to a changing world. Reed warbler (Acrocephalus scirpaceus) hosts employ costly defenses to combat parasitism by common cuckoos (Cuculus canorus). During the past three decades cuckoos have declined markedly across England, reducing parasitism at our study site (Wicken Fen) from 24% of reed warbler ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010