Detecting Shilling Attacks Using Hybrid Deep Learning Models
Abstract
:1. Introduction
- (1)
- We introduce a novel architecture to combine CNN and RNN models to better detect shilling attacks in item-based collaborative filtering recommendation systems as applied in e-commerce.
- (2)
- We provide a robust architecture that handles attacks of different sizes and types.
- (3)
- We consider both temporal and spatial information in the recommendation system (RS)’s ratings with a flexible time segmentation.
2. Related Work and Background
3. The Proposed Detection Model
4. Results and Discussion
4.1. Experimental Datasets
4.2. Performance Evaluation
4.3. Hybrid CNN-LSTM Results
4.4. Hybrid CNN-GRU Results
4.5. Comparative Analysis
5. Conclusions and Future Directions
Author Contributions
Funding
Conflicts of Interest
References
- Chirita, P.-A.; Nejdl, W.; Zamfir, C. Preventing Shilling Attacks in Online Recommender Systems. In Proceedings of the 7th ACM International Workshop on Web Information and Data Management, Bremen, Germany, 4 November 2005; pp. 67–74. [Google Scholar]
- Xia, H.; Fang, B.; Gao, M.; Ma, H.; Tang, Y.; Wen, J. A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf. Sci. 2015, 306, 150–165. [Google Scholar] [CrossRef]
- Yang, Z.; Cai, Z. Detecting Anomalous Ratings in Collaborative Filtering Recommender Systems. Int. J. Digit. Crime Forensics 2016, 8, 16–26. [Google Scholar] [CrossRef]
- Bilge, A.; Ozdemir, Z.; Polat, H. A Novel Shilling Attack Detection Method. Procedia Comput. Sci. 2014, 31, 165–174. [Google Scholar] [CrossRef] [Green Version]
- Zayed, R.A.; Ibrahim, L.F.; Hefny, H.A.; Salman, H.A. Shilling Attacks Detection in Collaborative Recommender System: Challenges and Promise. In Proceedings of the Workshops of the International Conference on Advanced Information Networking and Applications, Caserta, Italy, 15–17 April 2020; Springer: Cham, Switzerland; pp. 429–439. [Google Scholar]
- Zhang, S.; Chakrabarti, A.; Ford, J.; Makedon, F. Attack Detection in Time Series for Recommender Systems. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, 20–23 August 2006; Association for Computing Machinery: New York NY, USA; pp. 809–814. [Google Scholar]
- Lee, J.-S.; Zhu, D. Shilling Attack Detection—A New Approach for a Trustworthy Recommender System. INFORMS J. Comput. 2012, 24, 117–131. [Google Scholar] [CrossRef]
- Alonso, S.; Bobadilla, J.; Ortega, F.; Moya, R. Robust Model-Based Reliability Approach to Tackle Shilling Attacks in Collaborative Filtering Recommender Systems. IEEE Access 2019, 7, 41782–41798. [Google Scholar] [CrossRef]
- Mehta, B.; Nejdl, W. Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User Adapt. Interact. 2008, 19, 65–97. [Google Scholar] [CrossRef]
- Tong, C.; Yin, X.; Li, J.; Zhu, T.; Lv, R.; Sun, L.; Rodrigues, J.J.P.C. A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. Comput. J. 2018, 61, 949–958. [Google Scholar] [CrossRef]
- Zhou, Q.; Wu, J.; Duan, L. Recommendation attack detection based on deep learning. J. Inf. Secur. Appl. 2020, 52, 102493. [Google Scholar] [CrossRef]
- Gao, J.; Qi, L.; Huang, H.; Sha, C. Shilling Attack Detection Scheme in Collaborative Filtering Recommendation System Based on Recurrent Neural Network. In Proceedings of the Future of Information and Communication Conference, San Francisco, CA, USA, 5–6 March 2020; Springer: Cham, Switzerland; pp. 634–644. [Google Scholar]
- Deng, L.; Platt, J. Ensemble Deep Learning for Speech Recognition, in Proc. Interspeech, 2014. In Proceedings of the 15th Annual Conference of the International Speech Communication Association, Singapore, 14–18 September 2014. [Google Scholar]
- Zhang, R.; Yuan, Z.; Shao, X. A New Combined CNN-RNN Model for Sector Stock Price Analysis. In Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 23–27 July 2018; pp. 546–551. [Google Scholar] [CrossRef]
- Kim, T.-Y.; Cho, S.-B. Web traffic anomaly detection using C-LSTM neural networks. Expert Syst. Appl. 2018, 106, 66–76. [Google Scholar] [CrossRef]
- Guo, L.; Zhang, D.; Wang, L.; Wang, H.; Cui, B. CRAN: A Hybrid CNN-RNN Attention-Based Model for Text Classification. In International Conference on Conceptual Modeling, Xi’an, China, 22–25th October; Springer: Cham, Switzerland, 2018; pp. 571–585. [Google Scholar]
- Guo, X.; Zhang, H.; Yang, H.; Xu, L.; Ye, Z. A Single Attention-Based Combination of CNN and RNN for Relation Classification. IEEE Access 2019, 7, 12467–12475. [Google Scholar] [CrossRef]
- Hsu, S.T.; Moon, C.; Jones, P.; Samatova, N. A Hybrid CNN-RNN Alignment Model for Phrase-Aware Sentence Classification. In Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 2, Short Papers, Valencia, Spain, 3–7 April 2017; pp. 443–449. [Google Scholar]
- Kim, T.-Y.; Cho, S.-B. Predicting the Household Power Consumption Using CNN-LSTM Hybrid Networks. In International Conference on Intelligent Data Engineering and Automated Learning, Madrid, Spain, 21–23 November 2018; Springer: Cham, Switzerland, 2018; pp. 481–490. [Google Scholar]
- Burke, R. Hybrid Recommender Systems: Survey and Experiments. User Model. User Adapt. Interact. 2002, 12, 331–370. [Google Scholar] [CrossRef]
- Jiang, Y.; Chen, H.; Yang, B. Deep social collaborative filtering by trust. IEEE Trans. Pattern Anal. Mach. Intell. 2018, 39, 1633–1647. [Google Scholar]
- Bobadilla, J.; Ortega, F.; Hernando, A.; Gutiérrez, A. Recommender systems survey. Knowl. Based Syst. 2013, 46, 109–132. [Google Scholar] [CrossRef]
- Oku, K.; Kotera, R.; Sumiya, K. Geographical Recommender System Based on Interaction Between Map Operation and Category Selection. In Proceedings of the 1st International Workshop on Information Heterogeneity and Fusion in Recommender Systems, Barcelona, Spain, 26 September 2010; Association of Computing Machinery: New York, NY, USA; pp. 71–74. [Google Scholar]
- Geuens, S.; Coussement, K.; De Bock, K.W. A framework for configuring collaborative filtering-based recommendations derived from purchase data. Eur. J. Oper. Res. 2018, 265, 208–218. [Google Scholar] [CrossRef]
- Huang, Z.; Zeng, D.D. Why Does Collaborative Filtering Work? Transaction-Based Recommendation Model Validation and Selection by Analyzing Bipartite Random Graphs. INFORMS J. Comput. 2011, 23, 138–152. [Google Scholar] [CrossRef]
- Gunes, I.; Kaleli, C.; Bilge, A.; Polat, H. Shilling attacks against recommender systems: A comprehensive survey. Artif. Intell. Rev. 2012, 42, 767–799. [Google Scholar] [CrossRef]
- Zhu, B.; Ortega, F.; Bobadilla, J.; Gutiérrez, A. Assigning reliability values to recommendations using matrix factorization. J. Comput. Sci. 2018, 26, 165–177. [Google Scholar] [CrossRef]
- Cao, J.; Wu, Z.; Mao, B.; Zhang, Y. Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 2012, 16, 729–748. [Google Scholar] [CrossRef]
- Claypool, M.; Anuja, G.; Tim, M.; Paul, M.; Dmitry, N.; Matthew, S. Combing Content-Based and Collaborative Filters in an Online Newspaper. 1999. Available online: https://digitalcommons.wpi.edu/computerscience-pubs/194/ (accessed on 2 October 2020).
- Carrer-Neto, W.; Hernández-Alcaraz, M.L.; Valencia-García, R.; García-Sánchez, F. Social knowledge-based recommender system. Application to the movies domain. Expert Syst. Appl. 2012, 39, 10990–11000. [Google Scholar] [CrossRef] [Green Version]
- Xu, Y.; Zhang, F. Detecting shilling attacks in social recommender systems based on time series analysis and trust features. Knowl. Based Syst. 2019, 178, 25–47. [Google Scholar] [CrossRef]
- Mobasher, B.; Burke, R.; Bhaumik, R.; Williams, C. Toward trustworthy recommender systems. ACM Trans. Internet Technol. 2007, 7, 23. [Google Scholar] [CrossRef]
- Batmaz, Z.; Yilmazel, B.; Kaleli, C. Shilling attack detection in binary data: A classification approach. J. Ambient. Intell. Humaniz. Comput. 2019, 11, 2601–2611. [Google Scholar] [CrossRef]
- Cai, H.; Zhang, F. Detecting shilling attacks in recommender systems based on analysis of user rating behavior. Knowl. Based Syst. 2019, 177, 22–43. [Google Scholar] [CrossRef]
- Wu, Z.; Wu, J.; Cao, J.; Tao, D. HySAD: A Semi-Supervised Hybrid Shilling Attack Detector for Trustworthy Product Recommendation. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China, 12–16 August 2012; Association of Computing Machinery: New York, NY, USA; pp. 985–993. [Google Scholar]
- Tian, Y.; Pan, L. Predicting Short-Term Traffic Flow by Long Short-Term Memory Recurrent Neural Network. In Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), Chengdu, China, 19–21 December 2015; pp. 153–158. [Google Scholar]
- Vivekanandan, K.; Praveena, N. Hybrid convolutional neural network (CNN) and long-short term memory (LSTM) based deep learning model for detecting shilling attack in the social-aware network. J. Ambient. Intell. Humaniz. Comput. 2020. [Google Scholar] [CrossRef]
- Chung, J.; Gulcehre, C.; Cho, K.; Bengio, Y. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv 2014, arXiv:1412.3555. [Google Scholar]
- Kashef, R. Enhancing the Role of Large-Scale Recommendation Systems in the IoT Context. IEEE Access 2020, 8, 178248–178257. [Google Scholar] [CrossRef]
- Nawara, D.; Kashef, R. IoT-based Recommendation Systems–An Overview. In Proceedings of the 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada, 9–12 September 2020; pp. 1–7. [Google Scholar] [CrossRef]
Attack Model | Selected Item Set | Filler Item Set | Target Item Set | ||
---|---|---|---|---|---|
Items | Ratings | Items | Ratings | ||
Random | Not used | Randomly chosen | N (, ) | rmax | |
Average | Not used | Randomly chosen | rmax | ||
Bandwagon | Popular items | rmax | Randomly chosen | N (, ) | rmax |
AOP | Not used | X% of popular items | N (, ) | rmax |
Filler Size | Attack Size | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Random Attack | Average Attack | Bandwagon Attack | AOP Attack | |||||||||
10% | 15% | 20% | 10% | 15% | 20% | 10% | 15% | 20% | 10% | 15% | 20% | |
1% | 99.34 | 99.39 | 99.15 | 99.34 | 99.39 | 99.15 | 97.57 | 98.34 | 98.05 | 98.69 | 98.76 | 98.98 |
3% | 98.05 | 99.35 | 98.73 | 98.05 | 99.35 | 98.73 | 99.67 | 98.72 | 99.05 | 99.72 | 98.71 | 97.44 |
5% | 99.67 | 98.40 | 98.44 | 99.67 | 98.40 | 98.44 | 99.68 | 97.14 | 99.06 | 99.01 | 99.68 | 99.03 |
7% | 99.68 | 90.16 | 98.13 | 99.68 | 90.16 | 98.13 | 99.35 | 99.37 | 98.15 | 98.03 | 96.41 | 98.39 |
9% | 96.27 | 99.69 | 98.77 | 96.27 | 99.69 | 98.77 | 99.35 | 99.05 | 99.08 | 94.68 | 99.35 | 98.39 |
Filler Size | Attack Size | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Random Attack | Average Attack | Bandwagon Attack | AOP Attack | |||||||||
10% | 15% | 20% | 10% | 15% | 20% | 10% | 15% | 20% | 10% | 15% | 20% | |
1% | 96.43 | 97.21 | 97.99 | 96.94 | 97.22 | 96.97 | 96.95 | 95.96 | 96.46 | 96.95 | 95.72 | 95.47 |
3% | 97.71 | 96.97 | 96.51 | 97.45 | 96.21 | 93.12 | 94.70 | 95.50 | 95.99 | 94.71 | 96.67 | 97.64 |
5% | 95.45 | 95.23 | 96.25 | 96.71 | 97.49 | 94.99 | 96.15 | 96.44 | 97.78 | 97.95 | 96.62 | 98.00 |
7% | 98.22 | 98.49 | 95.53 | 96.97 | 96.23 | 94.51 | 98.28 | 95.82 | 97.10 | 97.83 | 95.31 | 97.05 |
9% | 96.46 | 98.26 | 98.51 | 96.73 | 96.76 | 98.01 | 98.58 | 96.68 | 97.67 | 95.45 | 96.96 | 98.61 |
Filler Size | Attack Size | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Random Attack | Average Attack | Bandwagon Attack | AOP Attack | |||||||||
10% | 15% | 20% | 10% | 15% | 20% | 10% | 15% | 20% | 10% | 15% | 20% | |
1% | 99.34 | 97.41 | 99.35 | 99.67 | 95.13 | 99.40 | 93.42 | 97.58 | 99.04 | 99.55 | 99.67 | 99.68 |
3% | 99.02 | 99.68 | 99.36 | 99.67 | 99.68 | 99.36 | 94.79 | 99.04 | 99.37 | 93.40 | 99.67 | 94.52 |
5% | 99.02 | 99.68 | 96.56 | 99.35 | 98.66 | 95.92 | 99.72 | 96.83 | 97.50 | 97.36 | 99.67 | 98.70 |
7% | 99.68 | 97.78 | 96.88 | 98.87 | 99.68 | 99.38 | 99.03 | 96.23 | 99.07 | 93.71 | 99.35 | 99.35 |
9% | 99.68 | 95.63 | 95.37 | 99.67 | 99.68 | 99.36 | 96.45 | 97.81 | 99.18 | 99.67 | 97.88 | 99.68 |
Filler Size | Attack Size | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Random Attack | Average Attack | Bandwagon Attack | AOP Attack | |||||||||
10% | 15% | 20% | 10% | 15% | 20% | 10% | 15% | 20% | 10% | 15% | 20% | |
1% | 99.74 | 95.95 | 95.48 | 97.46 | 97.72 | 98.24 | 97.46 | 97.73 | 96.47 | 97.98 | 95.21 | 96.48 |
3% | 96.37 | 96.19 | 94.35 | 96.63 | 97.87 | 95.99 | 95.42 | 95.49 | 97.17 | 97.36 | 92.87 | 96.20 |
5% | 99.31 | 99.55 | 96.47 | 96.36 | 97.54 | 96.91 | 97.27 | 98.22 | 98.45 | 98.17 | 95.96 | 96.87 |
7% | 99.35 | 97.89 | 95.65 | 96.54 | 94.76 | 97.11 | 96.77 | 97.08 | 98.76 | 97.62 | 97.45 | 96.62 |
9% | 93.87 | 97.43 | 97.09 | 96.54 | 97.24 | 97.49 | 97.35 | 98.82 | 98.64 | 97.94 | 95.35 | 98.20 |
Model | Accuracy % | Filler Size | Attack Size | Attack Model |
---|---|---|---|---|
CNN-LSTM | 99.72 | 3% | 10% | AOP |
CNN-GRU | 99.68 | 7% | 15% | Average |
CNN | 99.68 | 7% | 20% | Random |
LSTM | 98.61 | 7% | 10% | Random |
GRU | 97.66 | 1% | 10% | Random |
Model | Accuracy % | Filler Size | Attack Size | Attack Model |
---|---|---|---|---|
CNN-LSTM | 98.61 | 9% | 20% | AOP |
CNN-GRU | 99.74 | 1% | 10% | Random |
CNN | 93.04 | 9% | 15% | Random |
LSTM | 84.40 | 5% | 10% | AOP |
GRU | 85.82 | 5% | 20% | Bandwagon |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ebrahimian, M.; Kashef, R. Detecting Shilling Attacks Using Hybrid Deep Learning Models. Symmetry 2020, 12, 1805. https://doi.org/10.3390/sym12111805
Ebrahimian M, Kashef R. Detecting Shilling Attacks Using Hybrid Deep Learning Models. Symmetry. 2020; 12(11):1805. https://doi.org/10.3390/sym12111805
Chicago/Turabian StyleEbrahimian, Mahsa, and Rasha Kashef. 2020. "Detecting Shilling Attacks Using Hybrid Deep Learning Models" Symmetry 12, no. 11: 1805. https://doi.org/10.3390/sym12111805