期刊文献+

基于混合特征值的托攻击检测算法

Shilling Attack Detection Algorithm Based on Hybrid Eigenvalue
下载PDF
导出
摘要 传统的托攻击检测方法多采用基于评分值差异的算法,其在小规模情况下易造成误判率过高的问题。通过分析真实用户和攻击用户评分项目选择方式的差异,文中提出了一种基于混合特征值的托攻击检测算法。该算法在Degsim、MeanVar、WDA特征检测指标组成的特征模型基础上,加入了流行项目卡方估计值(Chi-square of popular item,CHIP)、新颖项目卡方估计值(Chi-square of novel item,CHIN)两个特征检测指标,构成一种新的特征模型。该特征模型在传统方法的基础上,提出对项目与流行项目、项目与新颖项目之间的关联程度的考量,依据特征属性选择K-means聚类与阈值判断相结合的分类方法,可有效区分攻击用户和正常用户。实验对比表明,该算法在小规模情况下可有效解决误判率高的问题,具有更好的检测准确度。 Aiming at the problem of high misjudgment rate in shilling attack detection of traditional differential algorithm based on score value,we propose a shilling attack detection algorithm based on the hybrid eigenvalue by analyzing the selection mode difference of score item between real users and false users.The algorithm adds two feature detection indexes CHIP(Chi-square of popular item)and CHIN(Chi-square of novel item)to form a new feature model on the basis of the feature model with three feature detection indexes,Degsim,MeanVar and WDA.In the new feature model,we consider the correlation degrees between the item and popular item,and between the item and novel item based on the traditional differential algorithm,and according to characteristic attribute,adopt the classification method which combines K-means clustering and threshold judgment to distinguish the attacking user from the normal user effectively.Experiment shows that the proposed algorithm can effectively solve the problem of high misjudgment rate in small scale and has better accuracy.
作者 雷梦宁 丁爱玲 王新美 韩佳倩 曹苗 LEI Meng-ning;DING Ai-ling;WANG Xin-mei;HAN Jia-qian;CAO Miao(School of Information Engineering,Chang’an University,Xi’an 710061,China)
出处 《计算机技术与发展》 2021年第10期87-92,共6页 Computer Technology and Development
基金 国家自然科学基金-青年科学基金项目(61806023)。
关键词 推荐系统 托攻击 混合特征 卡方估计值 聚类算法 recommendation system shilling attack hybrid feature Chi-square clustering algorithm
  • 相关文献

参考文献6

二级参考文献65

  • 1Adomavicius G, Tuzhilin A. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extension. IEEE Transactions on Knowledge and Data Engineering, 2005, 1T(6): 734-749.
  • 2O'Mahony M P, Hurley N J, Kushmerick N, Silvestre G C M. Collaborative recommendation: a robustness analy- sis. ACM Transactions on Internet Technology, 2004, 4(4): 344-377.
  • 3O'Mahony M P, Hurley N J, Silvestre G C M. Detecting noise in recommender system databases. In: Proceedings of the llth International Conference on Intelligent User Inter- faces. Sydney, Australia: ACM, 2006. 109-115.
  • 4Lam S, Riedl J. Shilling recommender systems for fun and profit. In: Proceedings of the 13th Conference on World Wide Web. New York, USA: ACM, 2004. 393-402.
  • 5Su X, Khoshgoftaav T M. A survey of collaborative filtering techniques. Advances in Artil~cial Intelligence, 2009, 2009: 1-20.
  • 6Mobasher B, Burke R, Bhaumik R, Williams C. Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 2007, 7(4): 1-40.
  • 7Mobasher B, Burke R, Bhaumik R, Sandvig J J. Attacks and remedies in collaborative recommendation. IEEE Intelligent Systems, 2007, 22(3): 56-63.
  • 8O'Mahony M P, Hurley N J, Silvestre G C M. Efficient and secure collaborative filtering through intelligent neighbor se- lection. In: Proceedings of the 16th European Conference on Artificial Intelligence. Valencia, Spain: IOS Press, 2004. 383-387.
  • 9Sandvig J J, Mobasher B, Burke R. Impact of relevance measures on the robustness and accuracy of collaborative fil- tering. In: Proceedings of the 8th International Conference on E-commerce and Web Technologies. Berlin, Germany: Springer, 2007. 99-108.
  • 10Sandvig J J, Mobasher B, Burke R. Robustness of collab- orative recommendation based on association rule mining. In: Proceedings of the ACM Conference on Recommender Systems. New York, USA: ACM, 2007. 105-112.

共引文献71

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部