skip to main content
10.1145/1097047.1097061acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
Article

Preventing shilling attacks in online recommender systems

Published:04 November 2005Publication History

ABSTRACT

Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalized recommendations. However, such systems have been shown to be vulnerable to attacks in which malicious users with carefully chosen profiles are inserted into the system in order to push the predictions of some targeted items. In this paper we propose several metrics for analyzing rating patterns of malicious users and evaluate their potential for detecting such shilling attacks. Building upon these results, we propose and evaluate an algorithm for protecting recommender systems against shilling attacks. The algorithm can be employed for monitoring user ratings and removing shilling attacker profiles from the process of computing recommendations, thus maintaining the high quality of the recommendations.

References

  1. G. K. Al Mamunur Rashid and J. Riedl. Influence in ratings-based recommender systems: An algorithm-independent approach. In Proceedings of SIAM International Conference on Data Mining, 2005.Google ScholarGoogle Scholar
  2. J. Canny. Collaborative filtering with privacy. In SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, page 45, Washington, DC, USA, 2002. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D.-H. Kim, V. Atluri, M. Bieber, N. Adam, and Y. Yesha. A clickstream-based collaborative filtering personalization model: towards a better performance. In WIDM '04: Proceedings of the 6th annual ACM international workshop on Web information and data management, pages 88--95, New York, NY, USA, 2004. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In WWW '04: Proceedings of the 13th international conference on World Wide Web, pages 393--402, New York, NY, USA, 2004. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Linden, B. Smith, and J. York. Amazon.com recommendations: Item-to-item collaborative filtering. IEEE Internet Computing, 7(1):76--80, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. N. Miller, J. A. Konstan, and J. Riedl. Pocketlens: Toward a personal recommender system. ACM Trans. Inf. Syst., 22(3):437--476, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. L. Nelson, J. Bollen, J. R. Calhoun, and C. E. Mackey. User evaluation of the nasa technical report server recommendation service. In WIDM '04: Proceedings of the 6th annual ACM international workshop on Web information and data management, pages 144--151, New York, NY, USA, 2004. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. O'Mahony, N. Hurley, N. Kushmerick, and G. Silvestre. Collaborative recommendation: A robustness analysis. ACM Trans. Inter. Tech., 4(4):344--377, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. P. O'Mahony, N. Hurley, and G. C. M. Silvestre. Promoting recommendations: An attack on collaborative filtering. In DEXA '02: Proceedings of the 13th International Conference on Database and Expert Systems Applications, pages 494--503, London, UK, 2002. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. H. Polat and W. Du. Privacy-preserving collaborative filtering using randomized perturbation techniques. In ICDM '03: Proceedings of the Third IEEE International Conference on Data Mining, page 625, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Resnick, N. Iacovou, M. Suchak, P. Bergstorm, and J. Riedl. GroupLens: An Open Architecture for Collaborative Filtering of Netnews. In Proceedings of ACM 1994 Conference on Computer Supported Cooperative Work, pages 175--186, Chapel Hill, North Carolina, 1994. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Z. Robin Burke, Bamshad Mobasher and R. Bhaumik. Identifying attack models for secure recommendation. In Beyond Personalization 2005, 2005.Google ScholarGoogle Scholar
  13. B. M. Sarwar, G. Karypis, J. A. Konstan, and J. Reidl. Item-based collaborative filtering recommendation algorithms. In World Wide Web, pages 285--295, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. U. Shardanand and P. Maes. Social information filtering: Algorithms for automating "word of mouth". In Proceedings of ACM CHI'95 Conference on Human Factors in Computing Systems, volume 1, pages 210--217, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. H.-J. Z. Xue-Feng Su and Z. Chen. Finding group shilling in recommendation system. In WWW '05: Proceedings of the 14th international conference on World Wide Web, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Preventing shilling attacks in online recommender systems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            WIDM '05: Proceedings of the 7th annual ACM international workshop on Web information and data management
            November 2005
            96 pages
            ISBN:1595931945
            DOI:10.1145/1097047

            Copyright © 2005 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 4 November 2005

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Upcoming Conference

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader