期刊文献+

基于非对称半监督集成SVM的托攻击检测方法 被引量:2

Shilling Attack Detection Approach Based on Asymmetric Semi-supervised Ensemble SVM
下载PDF
导出
摘要 受推荐系统在电子商务领域重大经济利益的驱动,恶意用户以非法牟利为目的实施托攻击,操纵改变推荐结果,使推荐系统面临严峻的信息安全威胁,如何识别和检测托攻击成为保障推荐系统信息安全的关键。传统支持向量机(SVM)方法同时受到小样本和数据不均衡两个问题的制约。为此,提出一种半监督SVM和非对称集成策略相结合的托攻击检测方法。首先训练初始SVM,然后引入K最近邻法优化分类面附近样本的标记质量,利用标记数据和未标记数据的混合样本集减少对标记数据的需求。最后,设计一种非对称加权集成策略,重点关注攻击样本的分类准确率,降低集成分类器对数据不均衡的敏感性。实验结果表明,本文方法有效地解决了小样本问题和数据不均衡分布问题,获得了较好的检测效果。 Driven by the significant economic benefits of the recommendation system in the field of electronic commerce, malicious users implement shilling attacks for the purpose of illegal profit making, manipulate and change the recommendation results. Recommendation system faces major security threats, so how to detect shilling attacks becomes crucial to guarantee the security of recommender system. Shilling attack detection method based on traditional support vector machine is challenged by the small sample problem and the asymmetric distribution problems. This paper proposes an asymmetric ensemble method with semi-supervised SVM for detecting shilling attacks to address these problems. In the first stage, I use support vector machine (SVM) as the basic classifier, and in the second stage us KNN classifier to improve the quality of the new training examples which are transformed from the boundary vectors, and unlabeled data are presented to produce a number of semi-supervised classifiers. Then by the asymmetric semi-supervised ensemble strategies, these classifiers are combined . The ensemble classification model pays more attention to the positive samples than the negative ones. The proposed approaeh is applied to benchmark problems, and the simulation results show its validity.
作者 吕成戍 LV Cheng-shu(School of Management Science and Engineering,Dongbei University of Finance and Economics,Dalian 116025,China)
出处 《运筹与管理》 CSSCI CSCD 北大核心 2018年第8期84-91,共8页 Operations Research and Management Science
基金 国家自然科学基金资助项目(71602021 71271045 71571033) 辽宁省社会科学规划基金资助项目(L16BGL016)
关键词 支持向量机 非对称加权 半监督集成 托攻击检测 信息安全 support vector machine asymmetric weighting semi-supervised ensemble shilling attack detec-tion information security
  • 相关文献

参考文献4

二级参考文献111

  • 1郑恩辉,李平,宋执环.代价敏感支持向量机[J].控制与决策,2006,21(4):473-476. 被引量:33
  • 2万柏坤,薛召军,李佳,王瑞平.应用ROC曲线优选模式分类算法[J].自然科学进展,2006,16(11):1511-1516. 被引量:23
  • 3余力,董斯维,郭斌.电子商务推荐攻击研究[J].计算机科学,2007,34(5):134-138. 被引量:11
  • 4Shardanand U, Maes P. Social information filtering: Algorithms for automating "Word of Mouth". In: Proc. of the Conf. on Human Factors in Computing Systems. New York: ACM Press, 1995.210-217.
  • 5Hill W, Stead L, Rosenstein M, Furnas G. Recommending and evaluating choices in a virtual community of use. In: Proc. of the Conf. on Human Factors in Computing Systems. New York: ACM Press, 1995. 194-201.
  • 6Resnick P, Iakovou N, Sushak M, Bergstrom P, Riedl J. GroupLens: An open architecture for collaborative filtering of netnews. In: Proc. of the Computer Supported Cooperative Work Conf. New York: ACM Press, 1994. 175-186.
  • 7Baeza-Yates R, Ribeiro-Neto B. Modern Information Retrieval. New York: Addison-Wesley Publishing Co., 1999.
  • 8Murthi BPS, Sarkar S. The role of the management sciences in research on personalization. Management Science, 2003,49(10): 1344-1362.
  • 9Smith SM, Swinyard WR. Introduction to marketing models. 1999. http://marketing.byu.edu/htmlpages/courses/693r/modelsbook/ preface.html
  • 10Adomavicius G, Tuzhilin A. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. on Knowledge and Data Engineering, 2005,17(6):734-749.

共引文献601

同被引文献20

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部