Loading [MathJax]/extensions/tex2jax.js

Preventing shilling attacks in online recommender systems

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Autorschaft

Organisationseinheiten

Details

OriginalspracheEnglisch
Titel des SammelwerksWIDM 2005
UntertitelProceedings of the 7th ACM International Workshop on Web Information and Data Management, Co-located with CIKM 2005
Herausgeber (Verlag)Association for Computing Machinery (ACM)
Seiten67-74
Seitenumfang8
ISBN (Print)1595931945, 9781595931948
PublikationsstatusVeröffentlicht - 4 Nov. 2005
VeranstaltungCIKM'05: 14th ACM International Conference on Information and Knowledge Management - Bremen, Deutschland
Dauer: 31 Okt. 20055 Nov. 2005

Publikationsreihe

NameProceedings of the Interntational Workshop on Web Information and Data Management WIDM

Abstract

Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalized recommendations. However, such systems have been shown to be vulnerable to attacks in which malicious users with carefully chosen profiles are inserted into the system in order to push the predictions of some targeted items. In this paper we propose several metrics for analyzing rating patterns of malicious users and evaluate their potential for detecting such shilling attacks. Building upon these results, we propose and evaluate an algorithm for protecting rec-ommender systems against shilling attacks. The algorithm can be employed for monitoring user ratings and removing shilling attacker profiles from the process of computing recommendations, thus maintaining the high quality of the recommendations.

ASJC Scopus Sachgebiete

Zitieren

Preventing shilling attacks in online recommender systems. / Chirita, Paul Alexandru; Nejdl, Wolfgang; Zamfir, Cristian.
WIDM 2005: Proceedings of the 7th ACM International Workshop on Web Information and Data Management, Co-located with CIKM 2005. Association for Computing Machinery (ACM), 2005. S. 67-74 (Proceedings of the Interntational Workshop on Web Information and Data Management WIDM).

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Chirita, PA, Nejdl, W & Zamfir, C 2005, Preventing shilling attacks in online recommender systems. in WIDM 2005: Proceedings of the 7th ACM International Workshop on Web Information and Data Management, Co-located with CIKM 2005. Proceedings of the Interntational Workshop on Web Information and Data Management WIDM, Association for Computing Machinery (ACM), S. 67-74, CIKM'05, Bremen, Bremen, Deutschland, 31 Okt. 2005. https://doi.org/10.1145/1097047.1097061
Chirita, P. A., Nejdl, W., & Zamfir, C. (2005). Preventing shilling attacks in online recommender systems. In WIDM 2005: Proceedings of the 7th ACM International Workshop on Web Information and Data Management, Co-located with CIKM 2005 (S. 67-74). (Proceedings of the Interntational Workshop on Web Information and Data Management WIDM). Association for Computing Machinery (ACM). https://doi.org/10.1145/1097047.1097061
Chirita PA, Nejdl W, Zamfir C. Preventing shilling attacks in online recommender systems. in WIDM 2005: Proceedings of the 7th ACM International Workshop on Web Information and Data Management, Co-located with CIKM 2005. Association for Computing Machinery (ACM). 2005. S. 67-74. (Proceedings of the Interntational Workshop on Web Information and Data Management WIDM). doi: 10.1145/1097047.1097061
Chirita, Paul Alexandru ; Nejdl, Wolfgang ; Zamfir, Cristian. / Preventing shilling attacks in online recommender systems. WIDM 2005: Proceedings of the 7th ACM International Workshop on Web Information and Data Management, Co-located with CIKM 2005. Association for Computing Machinery (ACM), 2005. S. 67-74 (Proceedings of the Interntational Workshop on Web Information and Data Management WIDM).
Download
@inproceedings{3b4823d0b27b41ac963fb82447f1d5b2,
title = "Preventing shilling attacks in online recommender systems",
abstract = "Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalized recommendations. However, such systems have been shown to be vulnerable to attacks in which malicious users with carefully chosen profiles are inserted into the system in order to push the predictions of some targeted items. In this paper we propose several metrics for analyzing rating patterns of malicious users and evaluate their potential for detecting such shilling attacks. Building upon these results, we propose and evaluate an algorithm for protecting rec-ommender systems against shilling attacks. The algorithm can be employed for monitoring user ratings and removing shilling attacker profiles from the process of computing recommendations, thus maintaining the high quality of the recommendations.",
keywords = "Collaborative filtering, Recommender systems, Shilling attacks, Web applications",
author = "Chirita, {Paul Alexandru} and Wolfgang Nejdl and Cristian Zamfir",
year = "2005",
month = nov,
day = "4",
doi = "10.1145/1097047.1097061",
language = "English",
isbn = "1595931945",
series = "Proceedings of the Interntational Workshop on Web Information and Data Management WIDM",
publisher = "Association for Computing Machinery (ACM)",
pages = "67--74",
booktitle = "WIDM 2005",
address = "United States",
note = "CIKM'05 : 14th ACM International Conference on Information and Knowledge Management, CIKM'05 ; Conference date: 31-10-2005 Through 05-11-2005",

}

Download

TY - GEN

T1 - Preventing shilling attacks in online recommender systems

AU - Chirita, Paul Alexandru

AU - Nejdl, Wolfgang

AU - Zamfir, Cristian

PY - 2005/11/4

Y1 - 2005/11/4

N2 - Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalized recommendations. However, such systems have been shown to be vulnerable to attacks in which malicious users with carefully chosen profiles are inserted into the system in order to push the predictions of some targeted items. In this paper we propose several metrics for analyzing rating patterns of malicious users and evaluate their potential for detecting such shilling attacks. Building upon these results, we propose and evaluate an algorithm for protecting rec-ommender systems against shilling attacks. The algorithm can be employed for monitoring user ratings and removing shilling attacker profiles from the process of computing recommendations, thus maintaining the high quality of the recommendations.

AB - Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalized recommendations. However, such systems have been shown to be vulnerable to attacks in which malicious users with carefully chosen profiles are inserted into the system in order to push the predictions of some targeted items. In this paper we propose several metrics for analyzing rating patterns of malicious users and evaluate their potential for detecting such shilling attacks. Building upon these results, we propose and evaluate an algorithm for protecting rec-ommender systems against shilling attacks. The algorithm can be employed for monitoring user ratings and removing shilling attacker profiles from the process of computing recommendations, thus maintaining the high quality of the recommendations.

KW - Collaborative filtering

KW - Recommender systems

KW - Shilling attacks

KW - Web applications

UR - http://www.scopus.com/inward/record.url?scp=84876544258&partnerID=8YFLogxK

U2 - 10.1145/1097047.1097061

DO - 10.1145/1097047.1097061

M3 - Conference contribution

AN - SCOPUS:84876544258

SN - 1595931945

SN - 9781595931948

T3 - Proceedings of the Interntational Workshop on Web Information and Data Management WIDM

SP - 67

EP - 74

BT - WIDM 2005

PB - Association for Computing Machinery (ACM)

T2 - CIKM'05

Y2 - 31 October 2005 through 5 November 2005

ER -

Von denselben Autoren