THE METHOD OF DETECTING INFORMATION ATTACK OBJECTS IN RECOMMENDATION SYSTEM BASED ON THE ANALYSIS OF RATING TRENDS
DOI:
https://doi.org/10.30837/ITSSI.2020.13.052Keywords:
recommendation systems, information attacks, information security, information attack detection, technical analysis, moving average, R/S analysisAbstract
The subject matter of the research is the process of identifying information attacks on the recommendation system. The goal of this work is to develop a method for detecting information attack objects in a recommendation system based on the analysis of trends in the ratings of system objects. The task to be solved is: develop a method of detecting information attack objects in a recommendation system. Results. The paper investigates methods for determining the existing trends in time series, in particular, methods based on a moving average, several moving averages and zigzag tops. Also, a method for predicting the dynamics of trends in a time series in the future based on R/S analysis was considered. The set of indicators has been proposed, by the values of which it is possible to determine the presence or absence of an information attack on an object of the recommendation system. This set of indicators includes: the existing trend in the numerical series of ratings of the system object, the predicted trend in the ratings of the system object, the number of getting of the object in the lists of recommendations and statistical characteristics of the series, for example, the number of target ratings, the variance of ratings, the variance of the time of assigning ratings, etc. On the basis of the proposed set of indicators, the method for detecting objects of information attack in a recommendation system using trend analysis in the ratings of system objects was developed. This method makes it possible to detect the presence of an information attack on the objects of the recommender system and generates the list of possible targets for bots. Many possible targets can be used to further search for bot profiles and clarify information about their true targets. This will make it possible, when searching for botnets, to check not all system profiles, but only those that interacted with probable targets of attack. Conclusions. The method of detecting information attack objects in recommendation system based on the analysis of rating trends was developed. The software implementation was created and experiments to test the effectiveness of the developed method were carried out. The experiments have shown that the developed method makes it possible to identify with high accuracy the objects of information attacks on recommender systems for random, average and popular attack models.
References
Editors Ricci, F., Rokach, L., Shapira, B., Kantor, P. B. (2010), Recommender Systems Handbook, 1st edition, New York, NY, USA : Springer-Verlag New York, Inc., 842 p. DOI: https://doi.org/10.1007/978-0-387-85820-3
Valois, B. Jr. C., Oliveira, M. A. (2011), "Recommender systems in social networks", JISTEM J.Inf.Syst. Technol. Manag., Vol. 8 No. 3, P. 681–716, available at : https://www.scielo.br/scielo.php?script=sci_arttext&pid=S1807-17752011000300009
Lam, S. K., Riedl, J. (2004), "Shilling recommender systems for fun and profit", Proceedings of the 13th International World Wide Web Conference, P. 393–402.
O’Mahony, M. P., Hurley, N. J., Silvestre G. C. M. (2002), "Promoting recommendations: An attack on collaborative filtering", From book Database and Expert Systems Applications: 13th International Conference, DEXA Aix-en-Provence, France, P. 494–503, available at : https://link.springer.com/chapter/10.1007/3-540-46146-9_49
Kumari, T., Punam, B. (2017), "A Comprehensive Study of Shilling Attacks in Recommender Systems", IJCSI International Journal of Computer Science Issues, Vol. 14, Issue 4, available at : https://www.ijcsi.org/papers/IJCSI-14-4-44-50.pdf
Kaur, P., Goel, S., (2016), "Shilling attack models in recommender system", 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, P. 1–5. DOI: 10.1109/INVENTIVE.2016.7824865
Gunes, I., Kaleli, C., Bilge, A., et al. (2014), "Shilling attacks against recommender systems: a comprehensive survey", Artif Intell Rev, No. 42, P. 767–799. DOI: https://doi.org/10.1007/s10462-012-9364-9
Zhou, W., Wen, J., Qu, Q., Zeng, J., Cheng, T. (2018), "Shilling attack detection for recommender systems based on credibility of group users and rating time series", PLoS ONE, No. 13 (5): e0196533, available at : https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0196533
Chirita, P. A., Nejdl, W., Zamfir, C. (2005), "Preventing shilling attacks in online recommender systems", In Proceedings of the ACM Workshop on Web Information and Data Management, P. 67–74, available at : https://dl.acm.org/doi/10.1145/1097047.1097061
Zhou, W., Wen, J., Koh, Y. S., Alam, S., Dobbie, G. (2014), "Attack detection in recommender systems based on target item analysis", 2014 International Joint Conference on Neural Networks (IJCNN), Beijing, P. 332–339, available at : https://ieeexplore.ieee.org/document/6889419
Williams, C. A., Mobasher, B., Burke, R. (2007), "Defending recommender systems: detection of profile injection attacks, Service Oriented Computing and Applications, P. 157–170.
Murphy, J. J. (2011), Technical Analysis of the Futures Markets: A Comprehensive Guide to Trading Methods and Applications, Moscow : Alpina Publisher, 610 p.
Schwager, J. (2017), Technical Analysis. Complete course, Moscow : Alpina Publisher, 804 p.
Prechter, R., Frost A. (2012), Elliot Wave Principle: Key to Stock Market Profits, Moscow : Alpina Publisher, 269 p.
Peters, E. (2004), Fractal Market Analysis: Applying Chaos Theory to Investment and Economics, Moscow : Internet-Trading, 304 p.
Anis, A. A., Lloyd, E. H. (1976), "The expected value of the adjusted rescaled Hurst range of independent normal summands", Biometrica, No. 63, P. 283–298.
Kalush, Ju. A., Loginov, V. M. (2002), "Hurst exponent and its hidden properties", Siberian Journal of Industrial Mathematics, Vol. 5, No. 4, P. 29–37.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2020 Yelyzaveta Meleshko
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.