期刊文献+

不均衡数据集下基于SVM的托攻击检测方法 被引量:5

Shilling Attack Detection Method Based on SVM Under Unbalanced Datasets
下载PDF
导出
摘要 传统支持向量机(SVM)方法在数据不均衡情况下无法有效实现托攻击检测。在研究SVM的基础上,提出一种基于欠采样和代价敏感SVM相结合的托攻击检测方法。利用边界样本修剪技术实现训练样本的均衡,在消除部分多数类样本显著减小数据不均衡程度的同时,保证信息损失最小。结合受试者工作特征分析技术,利用代价敏感SVM对重构后的样本集进行训练,在限定范围内自动搜索最优参数,进而调节阈值获得系统决策函数。实验结果表明,该方法能提高托攻击的检测精度。 Traditional Support Vector Machine(SVM) drops significantly when it is applied to the problem of learning from unbalanced datasets. Based on the study of SVA, a new classifying method which combines the method of under-sampling and cost-sensitive SVM together is proposed. In the first stage, balanced data are set by reconstructing both the majority and the minority class. And in the second stage, cost sensitive SVM is conducted for detection decision function. Receiver Operating Characteristic(ROC) analysis is used to select optimum parameters of cost sensitive SVM in limited grid scope. The proposed model is used for attack detection on recommender systems. Experimental results show that the proposed method can improve the classification accuracy.
出处 《计算机工程》 CAS CSCD 2013年第5期132-135,共4页 Computer Engineering
基金 辽宁省社会科学规划基金资助项目(L10BJL026)
关键词 攻击检测 不均衡数据集 代价敏感学习 欠采样 支持向量机 接收机工作特性分析 attack detection unbalanced dataset cost-sensitive learning under-sampling Support Vector Machine(SVM) Receiver Operating Characteristic(ROC) analysis
  • 相关文献

参考文献17

  • 1余力,董斯维,郭斌.电子商务推荐攻击研究[J].计算机科学,2007,34(5):134-138. 被引量:11
  • 2Lam S K, Riedl J. Shilling Recommender Systems for Fun and Profit[C]//Proc. of the 13th International Conference on World Wide Web. New York, USA: ACM Press, 2004: 393-402.
  • 3O'Mahony M, Hurley N J, Kushmerick N, et al.Collaborative Recommendation: A Robustness Analysis[J]. ACM Trans. on Internet Technology, 2004, 4(4): 344-377.
  • 4Vapnik V N. Statistical Learning Theory[M]. [S. l.]: Wiley, 1998.
  • 5Williams C A, Mobasher B, Burke R. Defending Recommender Systems: Detection of Profile Injection Attacks[J]. Service Oriented Computing and Applications, 2007, 1(3): 157-170.
  • 6李聪,骆志刚,石金龙.一种探测推荐系统托攻击的无监督算法[J].自动化学报,2011,37(2):160-167. 被引量:22
  • 7Wu Gang, Chang E Y. Class-boundary Alignment for Imbalanced Dataset Learning[C]//Proc. of Workshop on Learning from Imbalanced Datasets. Washington D. C., USA: AAAI Press, 2003: 786-795.
  • 8Weiss G M. Mining with Rarity: A Unifying Framework[J] SIGKDD Explorations, 2004, 6(1): 7-19.
  • 9Liao T W. Classification of Weld Flaws with Imbalanced Class Data[J]. Expert Systems with Applications, 2008, 35(3): 1041-1052.
  • 10郑恩辉,李平,宋执环.代价敏感支持向量机[J].控制与决策,2006,21(4):473-476. 被引量:33

二级参考文献68

  • 1余力,刘鲁,罗掌华.我国电子商务推荐策略的比较分析[J].系统工程理论与实践,2004,24(8):96-101. 被引量:45
  • 2余力,刘鲁.电子商务个性化推荐研究[J].计算机集成制造系统,2004,10(10):1306-1313. 被引量:104
  • 3凌晓峰,SHENG Victor S..代价敏感分类器的比较研究(英文)[J].计算机学报,2007,30(8):1203-1212. 被引量:35
  • 4Adomavicius G, Tuzhilin A. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extension. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(6): 734-749.
  • 5Li Q, Kim B M. Constructing user profiles for collaborative recommender system. In: Proceedings of the 6th Asia Pacific Web Conference. Hangzhou, China: Springer, 2004. 100--110.
  • 6Herlocker J L, Konstan J A, Borchers A, Riedl J. An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York, USA: ACM, 1999. 230-237.
  • 7Mobasher B, Burke R, Bhaumik R, Sandvig J J. Attacks and remedies in collaborative recommendation. IEEE InteI1igent Systems, 2007, 22(3): 56-63.
  • 8Burke R, Mobasher B, Zabicki R, Bhaumik R. Identifying attack models for secure recommendation. In: Proceedings of the Beyond Personalization Workshop on the International Conference on Intelligent User Interfaces. San Diego, USA: ACM Press, 2005. 347-361.
  • 9Lam S K, Riedl J. Shilling recommender systems for fun and profit. In: Proceedings of the 13th International Conference on World Wide Web. New York, USA: ACM, 2004. 393-402.
  • 10O'Mahony M, Hurley N J, Kushmerick N, Silvestre G. Collaborative recommendation: a robustness analysis. ACM Transactions on Internet Technology, 2004, 4(4): 344-377.

共引文献85

同被引文献20

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部