Ward_p_HMM: A Shilling Attack Detection Technique Using Ward_p Method and Hidden Markov Model
DOI:
https://doi.org/10.13053/cys-25-3-3907Keywords:
Profile injection attack, Hidden markov model, user matching degree, user suspicious degree, Wardp methodAbstract
Collaborative Filtering Recommender Systems (CFRSs) are widely employed in several applications because of its satisfying performance in the customized recommendation. Recent studies show that CFRSs are at risk of shilling attacks where attackers inject shilling profiles into the system. Malicious user injected ratings not only severely impact genuineness of recommendations but also user's trustworthiness within recommendation systems. Existing unsupervised clustering technique uses Ward method which is an iterative method of low scalability. For addressing this issue, in this work an unsupervised SA detection technique named WardpHMM has been proposed. It uses Wardp and Hidden Markov Model (HMM). In this proposed method HMM is used to measure difference of user’s rating behavior. It generates User Suspicious Degree (USD) of each user by analyzing user’s Suspicious Degree Range of Items (SDRI) and User’s Matching Degree (UMD). Then Wardp method is applied to merge users based on USD and to acquire group of Attack Users (AUs). For performance analysis of the proposed technique Amazon-ratings sample dataset has been used. The performance comparison shows that proposed WardpHMM technique outperforms baseline technique with respect to precision, recall and F1-score.Downloads
Published
2021-08-18
Issue
Section
Articles
License
Hereby I transfer exclusively to the Journal "Computación y Sistemas", published by the Computing Research Center (CIC-IPN),the Copyright of the aforementioned paper. I also accept that these
rights will not be transferred to any other publication, in any other format, language or other existing means of developing.I certify that the paper has not been previously disclosed or simultaneously submitted to any other publication, and that it does not contain material whose publication would violate the Copyright or other proprietary rights of any person, company or institution. I certify that I have the permission from the institution or company where I work or study to publish this work.The representative author accepts the responsibility for the publicationof this paper on behalf of each and every one of the authors.
This transfer is subject to the following conditions:- The authors retain all ownership rights (such as patent rights) of this work, except for the publishing rights transferred to the CIC, through this document.
- Authors retain the right to publish the work in whole or in part in any book they are the authors or publishers. They can also make use of this work in conferences, courses, personal web pages, and so on.
- Authors may include working as part of his thesis, for non-profit distribution only.