Generating a new shilling attack for recommendation systems

3Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

A collaborative filtering-based recommendation system has been an integral part of e-commerce and e-servicing. To keep the recommendation systems reliable, authentic, and superior, the security of these systems is very crucial. Though the existing shilling attack detection methods in collaborative filtering are able to detect the standard attacks, in this paper, we prove that they fail to detect a new or unknown attack. We develop a new attack model, named Obscure attack, with unknown features and observed that it has been successful in biasing the overall top-N list of the target users as intended. The Obscure attack is able to push target items to the top-N list as well as remove the actual rated items from the list. Our proposed attack is more effective at a smaller number of k in top-k similar user as compared to other existing attacks. The effectivity of the proposed attack model is tested on the MovieLens dataset, where various classifiers like SVM, J48, random forest, and naïve Bayes are utilized.

Cite

CITATION STYLE

APA

Singh, P. K., Pramanik, P. K. D., Sardar, M., Nayyar, A., Masud, M., & Choudhury, P. (2022). Generating a new shilling attack for recommendation systems. Computers, Materials and Continua, 71(2), 2827–2846. https://doi.org/10.32604/cmc.2022.020437

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free