期刊文献+

安全推荐系统中基于信任的检测模型 被引量:1

A Trust-Based Detecting Mechanism in Secure Recommender Systems
下载PDF
导出
摘要 在网格环境中,推荐系统通过提供高品质的个性化推荐,帮助网格用户选择更好的服务。另外,推荐系统也应用于虚拟机管理平台来评估虚拟机的性能和可靠性。然而,推荐结果对用户偏好信息的敏感性使得推荐系统易受到人为攻击(用户概貌注入攻击或托攻击)。本文中,我们提出并评估了一种新的基于信任的安全检测算法以保护推荐系统抵御用户概貌注入攻击。并且,我们分别在用户级和项目级上讨论了信任检测与RDMA检测的结合。最后,我们通过试验表明这些新的安全检测机制可以取得更好的检测精度。 Recommender systems could be applied in grid environment to help grid users select more suitable services by making high quality personalized recommendations. Also,recommendation could be employed in the virtual machines managing platform to measure the performance and creditability of each virtual machine. However,such systems have been shown to be vulnerable to profile injection attacks (shilling attacks),attacks that involve the insertion of malicious profiles into the ratings database for the purpose of altering the system's recommendation behavior. In this paper we introduce and evaluate a new trust-based detecting algorithm for protecting recommender systems against profile injection attacks. Moreover,we discuss the combination of our trus-based metrics with previous metrics such as RDMA in profile-level and item-level respectively. In the end,we show these metrics can lead to improved detecting accuracy experimentally.
出处 《微计算机信息》 2010年第3期68-70,63,共4页 Control & Automation
基金 基金申请人:骆源 李明禄 项目名称:计算系统虚拟化基础理论与方法研究 基金颁发部门:国家科学技术部(2007CB310900)
关键词 推荐系统 协同过滤 用户概貌注入攻击 信任 Recommender systems Collaborative filtering Profile Injection Attack Trust
  • 相关文献

参考文献20

  • 1Foster and C. Kesselman "The Grid: Blueprint fora Fulawe Computing Infrastructure" Morgan Kaufmann Publishers, 1999.
  • 2Jonathan L. HerLoeker, Joseph A "An Algorithmic Framework for Performing Collaborative Filtering" Proceedings of lhe 22rid annual international ACM SIGIR conference, Berkeleyl California, 1999.
  • 3John S. Breese, David Heckerman, Carl Kadie. "Empirical Analysis of Predictive Algorithms for Collaborative Filtering" Microsoft Research One Microsoft Way Redmond, May 1998.
  • 4O' Donovan, B Smyth "Trust in Recommender Systems" Proceedings of the lOth international conference on IUI; 2005.
  • 5B Sarwar, G Karypis, J Konstan, J Reidl "hem-Based Collaboralive Fihering Recommendation Algorithm" Proceedings of the 10th international conference on WWW, 2001.
  • 6R Burke, B Mobasher "Identifying Attack Models for Secure Recommendation" Beyond Personalization, 2005.
  • 7R. Burke, B. Mohasher, R. Bhaumik "Limited knowledge shilling attacks in collaborative filtering systems" In Proc. of lhe 3rd LICAI Workshop in Intelligent Techniques for Personalization, Edinburgh, Scotland, August 2005.
  • 8R Burke, B. Mobasher, C. Williams, and R. Bha'umik "Seg2 ment-based injection attacks against collaborative filtering recom" mender systems" In Proc. of the Int'l Conference on Data Mining (ICDM 2005), Houston, December 2005.
  • 9B Mobasher, R Burke "Effective Attack Models for Shilling Item-Based Collal-rative Filtering Systems" Proc. of WebKDD, 2005.
  • 10SK Lam, J Riedl "Shilling Recommender Systems for Fun and Profit" Proceedings of the 13th international conference on WWW', 2004.

二级参考文献4

  • 1邓爱林,左子叶,朱扬勇.基于项目聚类的协同过滤推荐算法[J].小型微型计算机系统,2004,25(9):1665-1670. 被引量:147
  • 2Badrul Sarwar, George Karypis,Joseph Konstan,John Reidl. Item- Based Collaborative Filtering Recommendation Algorithms [J]. Proceedings of the tenth international conference on World Wide Web. 2003: 285-295.
  • 3Margaret H.Dunham著,郭崇慧,田凤占,靳晓明等译.数据挖掘教程.第1版.北京:清华大学出版社,2005.
  • 4闵敏.应用于顾客购物相似性聚类的Rock改进算法[J].扬州大学学报:自然科学版,2006,3:91-94.

共引文献5

同被引文献12

  • 1HE X, LUO Y. Mutual Information based SimilarityMeasure for Collaborative Filtering. Progress inInformatics and Computing (PIC). [C]// 2010 IEEEInternational Conference. Shanghai: IEEE, 2010:1117-1121.
  • 2ZHANG Q, LUO Y,WENG C,et al. A Trust-BasedDetecting Mechanism against Profile InjectionAttacks in Recommender Systems [C]. Secure SoftwareIntegration and Reliability Improvement, 2009:59-64.
  • 3CHIRITA PA, NEJDL W,ZAMFIR C. Preventing ShillingAttacks in Online Recommender Systems[C]//Proceedings of the 7th annual ACM InternationalWorkshop on WIDM. [s. 1.] :ACM,2005.
  • 4SU XF, ZENG HJ, CHEN Z. Finding Group Shilling inRecommendation System[C]// International WorldWide Web Conference, Bremen, Germany:[s. n.], 2005:960-961.
  • 5MAH0NY MP, MURLEY NJ, SILVESTREC. Utility-basedNeighborhood Formation for Efficient and RobustCollaborative Filtering. Proceedings of the 5thACM conference on Electronic commerce [C], New York,NY, USA 2004:260-261.
  • 6M0BASHER B,BURKE R, WILLIAMS C,et al. Analysis andDetection of Segment-focused Attacks AgainstCollaborative Recommendation[J]. Advances in WebMining and Web Usage Analysis, 2006:96—118.
  • 7JOLLIFFE I. Principal Component Analysis[M]. WileyOnline Library, 2005.
  • 8JOLLIFFE, I. Discarding Variables in a PrincipalComponent Analysis. I: Artificial Data[J]. Appl.Stat. 1972,21(02):160 - 173.
  • 9MILLER, BRADLEY N,ALBERT I, et al. MovieLensUnplugged: Experiences with an OccasionallyConnected Recommender System. Proceedings of the8th international conference on Intelligent userinterfaces[C]//[s. 1.]. ACM, 2003:263-266.
  • 10胡明,刘嘉勇,刘亮.一种基于代码特征的网页木马改良模型研究[J].通信技术,2010,43(8):155-157. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部