期刊文献+

基于SVM和粗糙集理论的用户概貌攻击检测方法 被引量:2

Approach of Detecting User Profile Attacks Based on SVM and Rough Set Theory
下载PDF
导出
摘要 针对现有用户概貌攻击检测算法存在准确率不高的问题,提出一种基于SVM和粗糙集理论的用户概貌攻击检测方法.首先,基于项目类别提出一种特征提取方法;然后,结合所提特征与已有特征分别联合填充规模后通过SVM进行二分类检测,再把各个特征检测结果合并构成信息表;最后,利用粗糙集理论生成的决策规则对信息表进行决策,得到最终的检测结果.实验结果表明,本文提出的方法有效提高了攻击检测的准确率. Aiming at the problem that the precision of the existing user profile attack detection algorithms is not high, based on SVM and rough set theory we propose an approach to detect user profile attack. Firstly, we propose an attribute extraction method based on the item category. Then, we use SVM to perform the detection based on combing the fill size with the existing attributes and the proposed attributes respectively. The detection results are used to generate the information table. Finally, we use the decision rules generated by rough set theory to determine the information table to generate the final test results. The experimental results show that the proposed method can effectively improve the precision of the attack detection.
作者 张付志 王波
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第1期108-113,共6页 Journal of Chinese Computer Systems
基金 河北省自然科学基金项目(F2011203219 F2013203124)资助 河北省高等学校科学技术研究重点项目(ZH2012028)资助
关键词 协同过滤 用户概貌攻击 攻击检测 SVM 粗糙集理论 collaborative filtering user profile attack attack detection SVM rough set theory
  • 相关文献

参考文献4

二级参考文献26

  • 1MOBASHER B, BURKE R D, BHAUMIK R, et al. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness [ J]. ACM Transactions on Internet Technology, 2007, 7(4): 23-38.
  • 2CHIRITA P A, NEJDL W, ZAMFIR C. Preventing shilling attacks in online recommender systems [ C]//Proceedings of ACM International Workshop on Web Information and Data Management. New York: ACM Press, 2005:67-74.
  • 3BURKE R, MOBASHER B, WILLIAMS C, et al. Segment-based injection attaeks against collaborative filtering recommender systems [ C]//Proceedings of the Fifth IEEE International Conference on Data Mining. Washington, DC: IEEE Computer Society, 2005: 577 - 580.
  • 4Adomavicius G, Tuzhilin A. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extension. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(6): 734-749.
  • 5Li Q, Kim B M. Constructing user profiles for collaborative recommender system. In: Proceedings of the 6th Asia Pacific Web Conference. Hangzhou, China: Springer, 2004. 100--110.
  • 6Herlocker J L, Konstan J A, Borchers A, Riedl J. An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York, USA: ACM, 1999. 230-237.
  • 7Mobasher B, Burke R, Bhaumik R, Sandvig J J. Attacks and remedies in collaborative recommendation. IEEE InteI1igent Systems, 2007, 22(3): 56-63.
  • 8Burke R, Mobasher B, Zabicki R, Bhaumik R. Identifying attack models for secure recommendation. In: Proceedings of the Beyond Personalization Workshop on the International Conference on Intelligent User Interfaces. San Diego, USA: ACM Press, 2005. 347-361.
  • 9Lam S K, Riedl J. Shilling recommender systems for fun and profit. In: Proceedings of the 13th International Conference on World Wide Web. New York, USA: ACM, 2004. 393-402.
  • 10O'Mahony M, Hurley N J, Kushmerick N, Silvestre G. Collaborative recommendation: a robustness analysis. ACM Transactions on Internet Technology, 2004, 4(4): 344-377.

共引文献256

同被引文献9

引证文献2

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部