THE METHOD OF DETECTING INFORMATION ATTACK OBJECTS IN RECOMMENDATION SYSTEM BASED ON THE ANALYSIS OF RATING TRENDS

Authors

DOI:

https://doi.org/10.30837/ITSSI.2020.13.052

Keywords:

recommendation systems, information attacks, information security, information attack detection, technical analysis, moving average, R/S analysis

Abstract

The subject matter of the research is the process of identifying information attacks on the recommendation system. The goal of this work is to develop a method for detecting information attack objects in a recommendation system based on the analysis of trends in the ratings of system objects. The task to be solved is: develop a method of detecting information attack objects in a recommendation system. Results. The paper investigates methods for determining the existing trends in time series, in particular, methods based on a moving average, several moving averages and zigzag tops. Also, a method for predicting the dynamics of trends in a time series in the future based on R/S analysis was considered. The set of indicators has been proposed, by the values of which it is possible to determine the presence or absence of an information attack on an object of the recommendation system. This set of indicators includes: the existing trend in the numerical series of ratings of the system object, the predicted trend in the ratings of the system object, the number of getting of the object in the lists of recommendations and statistical characteristics of the series, for example, the number of target ratings, the variance of ratings, the variance of the time of assigning ratings, etc. On the basis of the proposed set of indicators, the method for detecting objects of information attack in a recommendation system using trend analysis in the ratings of system objects was developed. This method makes it possible to detect the presence of an information attack on the objects of the recommender system and generates the list of possible targets for bots. Many possible targets can be used to further search for bot profiles and clarify information about their true targets. This will make it possible, when searching for botnets, to check not all system profiles, but only those that interacted with probable targets of attack. Conclusions. The method of detecting information attack objects in recommendation system based on the analysis of rating trends was developed. The software implementation was created and experiments to test the effectiveness of the developed method were carried out. The experiments have shown that the developed method makes it possible to identify with high accuracy the objects of information attacks on recommender systems for random, average and popular attack models.

Author Biography

Yelyzaveta Meleshko, Central Ukrainian National Technical University

PhD (Engineering Sciences), Associate Professor, Associate Professor of the Department of Cybersecurity and Software

References

Editors Ricci, F., Rokach, L., Shapira, B., Kantor, P. B. (2010), Recommender Systems Handbook, 1st edition, New York, NY, USA : Springer-Verlag New York, Inc., 842 p. DOI: https://doi.org/10.1007/978-0-387-85820-3

Valois, B. Jr. C., Oliveira, M. A. (2011), "Recommender systems in social networks", JISTEM J.Inf.Syst. Technol. Manag., Vol. 8 No. 3, P. 681–716, available at : https://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752011000300009

Lam, S. K., Riedl, J. (2004), "Shilling recommender systems for fun and profit", Proceedings of the 13th International World Wide Web Conference, P. 393–402.

O’Mahony, M. P., Hurley, N. J., Silvestre G. C. M. (2002), "Promoting recommendations: An attack on collaborative filtering", From book Database and Expert Systems Applications: 13th International Conference, DEXA Aix-en-Provence, France, P. 494–503, available at : https://link.springer.com/chapter/10.1007/3-540-46146-9_49

Kumari, T., Punam, B. (2017), "A Comprehensive Study of Shilling Attacks in Recommender Systems", IJCSI International Journal of Computer Science Issues, Vol. 14, Issue 4, available at : https://www.ijcsi.org/papers/IJCSI-14-4-44-50.pdf

Kaur, P., Goel, S., (2016), "Shilling attack models in recommender system", 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, P. 1–5. DOI: 10.1109/INVENTIVE.2016.7824865

Gunes, I., Kaleli, C., Bilge, A., et al. (2014), "Shilling attacks against recommender systems: a comprehensive survey", Artif Intell Rev, No. 42, P. 767–799. DOI: https://doi.org/10.1007/s10462-012-9364-9

Zhou, W., Wen, J., Qu, Q., Zeng, J., Cheng, T. (2018), "Shilling attack detection for recommender systems based on credibility of group users and rating time series", PLoS ONE, No. 13 (5): e0196533, available at : https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0196533

Chirita, P. A., Nejdl, W., Zamfir, C. (2005), "Preventing shilling attacks in online recommender systems", In Proceedings of the ACM Workshop on Web Information and Data Management, P. 67–74, available at : https://dl.acm.org/doi/10.1145/1097047.1097061

Zhou, W., Wen, J., Koh, Y. S., Alam, S., Dobbie, G. (2014), "Attack detection in recommender systems based on target item analysis", 2014 International Joint Conference on Neural Networks (IJCNN), Beijing, P. 332–339, available at : https://ieeexplore.ieee.org/document/6889419

Williams, C. A., Mobasher, B., Burke, R. (2007), "Defending recommender systems: detection of profile injection attacks, Service Oriented Computing and Applications, P. 157–170.

Murphy, J. J. (2011), Technical Analysis of the Futures Markets: A Comprehensive Guide to Trading Methods and Applications, Moscow : Alpina Publisher, 610 p.

Schwager, J. (2017), Technical Analysis. Complete course, Moscow : Alpina Publisher, 804 p.

Prechter, R., Frost A. (2012), Elliot Wave Principle: Key to Stock Market Profits, Moscow : Alpina Publisher, 269 p.

Peters, E. (2004), Fractal Market Analysis: Applying Chaos Theory to Investment and Economics, Moscow : Internet-Trading, 304 p.

Anis, A. A., Lloyd, E. H. (1976), "The expected value of the adjusted rescaled Hurst range of independent normal summands", Biometrica, No. 63, P. 283–298.

Kalush, Ju. A., Loginov, V. M. (2002), "Hurst exponent and its hidden properties", Siberian Journal of Industrial Mathematics, Vol. 5, No. 4, P. 29–37.

Downloads

How to Cite

Meleshko, Y. (2020). THE METHOD OF DETECTING INFORMATION ATTACK OBJECTS IN RECOMMENDATION SYSTEM BASED ON THE ANALYSIS OF RATING TRENDS. INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, (3 (13), 52–57. https://doi.org/10.30837/ITSSI.2020.13.052

Issue

Section

INFORMATION TECHNOLOGY