Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.6.1353

State Information Based Recommendation Algorithm for Minimizing the Malicious User's Influence  

Noh, Taewan (Seoul National University)
Oh, Hayoung (Soongsil University)
Noh, Giseop (Republic of Korea Air Force)
Kim, Chong-Kwon (Seoul National University)
Abstract
With the extreme development of Internet, recently most users refer the sites with the various Recommendation Systems (RSs) when they want to buy some stuff, movie and music. However, the possibilities of the Sybils with the malicious behaviors may exists in these RSs sites in which Sybils intentionally increase or decrease the rating values. The RSs cannot play an accurate role of the proper recommendations to the general normal users. In this paper, we divide the given rating values into the stable or unstable states and propose a system information based recommendation algorithm that minimizes the malicious user's influence. To evaluate the performance of the proposed scheme, we directly crawl the real trace data from the famous movie site and analyze the performance. After that, we showed proposed scheme performs well compared to existing algorithms.
Keywords
Recommendation system; Sybil; Social network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Adomavicius, G., & Tuzhilin, A., "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," Proceedings of the IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 6, pp. 734-749, June 2005   DOI
2 Ma, H., Zhou, D., Liu, C., Lyu, M. R., & King, I., "Recommender systems with social regularization," Proceedings of the fourth ACM international conference on Web search and data mining, pp. 287-296, Feb. 2014.
3 Lang, K., "News weeder: Learning to filter net news," Proceeding of the Twelfth International Conference on Machine learning, pp. 331-339. July 1995.
4 Linden, G., Smith, B., & York, J., "Amazon. com recommendations: Item-to-item collaborative filtering," Proceedings of the IEEE Internet Computing, vol. 7, no. 1, pp. 76-80, Feb. 2003.   DOI
5 Melville, P., & Sindhwani, V., "Recommender systems," Proceedings of the Encyclopedia of machine learning, pp. 829-838, 2010.
6 Melville, P., Mooney, R. J., & Nagarajan, R., "Content-boosted collaborative filtering for improved recommendations," Proceedings of the national conference on artificial intelligence, pp. 187-192, 2002.
7 News of the small businesses, http://news.kbiz.or.kr/news/article-View.html?idxno=36336
8 MBC news about the inaccurate RSs, http://imnews.imbc.com/replay/2013/nwdesk/article/3316638_11981.html
9 H. Yu, C. Shi, M. Kaminsky, P. Gibbsons and F.Xiao, "Dsybil: Optimal Sybil-Resistance for Recommendation Systems," Proceedings of the 30th IEEE Symposium on Security and Privacy, pp. 283-298, 2009.
10 Z. Cheng and N. Hurley, "Robust Collaborative Recommendation by Least Trimmed Squares Matrix Factorization," Proceedings of the 22nd IEEE International Conference on Tools with Artificial Intelligence, vol. 2, pp. 105-112, 2010.
11 Y. Koren, R. bell, and C. Volinsky, "Matrix factorization techniques for recommender systems," Proceedings of IEEE Computer, vol. 42, no. 8, pp. 30-37, Aug. 2009.
12 Mehta, B., Hofmann, T., & Fankhauser, P., "Lies and propaganda: Detecting spam users in collaborative filtering," Proceedings of the 12th international conference on intelligent user interfaces, pp. 14-21, Jan. 2007
13 J. Douceur, "The sybil attack," Proceedings of 1st International Workshop on Peer-to-Peer Systems, pp. 251-260, 2002.
14 B. Mobasher, R. Bruke, R. Bhaumik, and C. Williams, "Toward Trustworthy Recommender Systems: An Analysis of Attack Models and Algorithm Robustness," Journal of ACM Transcations on Internet Technology, vol. 7 no. 4, Oct. 2007.
15 N. Hurley, "Robustness of Recommender Systems," Proceedings of the fifth ACM conference on Recommender systems, pp. 9-10, 2011.
16 Mehta, B., & Nejdl, W. "Attack resistant collaborative filtering," Proceedings of the 31st annual international ACM SIGIR conference on research and development in information retrieval, pp. 75-82, 2008.
17 B. Mobasher, R. Burke, and J. Sandvig, "Modelbased collaborative filtering as a defense against profile injection attacks," Proceedings of the 21st National Conference on Artificial Intelligence and the 18th Innovative Applications of artificial Intelligence Conference, vol. 2, pp. 1388-1393, 2006.
18 Gao Feng, "Robust Online Filter Recommended Algorithm based on Attack Profile," Proceedings of International Journal of Security and Its Applications, vol. 8, no. 4, pp. 253-264, July 2014.
19 Giseop Noh, Young-myoung Kang, Hayoung Oh, Chong-kwon Kim, "Robust Sybil attack defense with information level in online Recommender Systems," Proceedings of the Expert Systems with Applications vol. 41, no. 4, pp. 1781-1791, Mar. 2014.   DOI
20 Sheng Zhang, Amit Chakrabarti, James Ford, Fillia Makedon, "Attack Detection in Time Series for Recommendation Systems," Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 809-814, 2006.
21 Zhuo Zhang, Sanjeev R. Kulkarni, "Detection of Shilling Attacks in Recommender Systems via Spectral Clustering," Proceedings of the Information Fusion and 17th International Conference, pp. 1-8, 2014.
22 Man Li, "Shilling Attack Detection Algorithm based on Non-random-missing Mechanism," Proceedings of the International Journal of Security and Its Applications, vol. 8, no. 6, pp. 115-126, 2013.
23 Jie Cao, Zhiang Wu, Bo Mao, Yanchun Zhang, "Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system," Proceedings of the World Wide Web vol. 16, no. 5-6, pp. 729-748, Nov. 2013.   DOI
24 Wei Zhou, Junhao Wen, Yun Sing Koh, Shafiq Alam and Gillian Dobbie, "Attack detection in recommender systems based on target item analysis," Proceedings of the Neural Networks and International Joint Conference, pp. 332-339, 2014.
25 P.-A. Chirita, W. Nejdl, and C. Zamfir, "Preventing shilling attacks in online recommender systems," Proceedings of the. 7th Annual ACM International Workshop on Web Information and Data Management, pp. 67-74, 2005.