Temporal Defenses for Robust Recommendations
نویسندگان
چکیده
Recommender systems are vulnerable to attack: malicious users may deploy a set of sybils to inject ratings in order to damage or modify the output of Collaborative Filtering (CF) algorithms. To protect against these attacks, previous work focuses on designing sybil profile classification algorithms, whose aim is to find and isolate sybils. These methods, however, assume that the full sybil profiles have already been input to the system. Deployed recommender systems, on the other hand, operate over time, and recommendations may be damaged while sybils are still injecting their profiles, rather than only after all malicious ratings have been input. Furthermore, system administrators do not know when their system is under attack, and thus when to run these classification techniques, thus risking to leave their recommender system vulnerable to attacks. In this work, we address the problem of temporal sybil attacks, and propose and evaluate methods for monitoring global, user and item behaviour over time, in order to detect rating anomalies that reflect an ongoing attack.
منابع مشابه
Developing Robust Project Scheduling Methods for Uncertain Parameters
A common problem arising in project management is the fact that the baseline schedule is often disrupted during the project execution because of uncertain parameters. As a result, project managers are often unable to meet the deadline time of the milestones. Robust project scheduling is an effective approach in case of uncertainty. Upon adopting this approach, schedules are protected against po...
متن کاملQuantitative Analysis of Active Cyber Defenses Based on Temporal Platform Diversity
Active cyber defenses based on temporal platform diversity have been proposed as way to make systems more resistant to attacks. These defenses change the properties of the platforms in order to make attacks more complicated. Unfortunately, little work has been done on measuring the effectiveness of these defenses. In this work, we use four different approaches to quantitatively analyze these de...
متن کاملMagNet and "Efficient Defenses Against Adversarial Attacks" are Not Robust to Adversarial Examples
MagNet and “Efficient Defenses...” were recently proposed as a defense to adversarial examples. We find that we can construct adversarial examples that defeat these defenses with only a slight increase in distortion.
متن کاملA Novel Method for Measuring the Quality of Temporal Integration in Public Transport Systems
Temporal coordination of services, as a crucial aspect of integration in public transport systems, has always been a big concern for transit planners and schedulers. One of the major issues in the way of coordinating transit services is the lack of a robust measure of effectiveness for assessing the quality of temporal coordination in public transport systems. Even though the network-wide summa...
متن کاملReed Warbler Hosts Fine-Tune their Defenses to Track Three Decades of Cuckoo Decline
Interactions between avian hosts and brood parasites can provide a model for how animals adapt to a changing world. Reed warbler (Acrocephalus scirpaceus) hosts employ costly defenses to combat parasitism by common cuckoos (Cuculus canorus). During the past three decades cuckoos have declined markedly across England, reducing parasitism at our study site (Wicken Fen) from 24% of reed warbler ne...
متن کامل