Skip to main content

An Outlier Accuracy Improvement in Shilling Attacks Using KSOM

  • Conference paper
  • First Online:
Intelligent Communication, Control and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 989))

Abstract

Due to the rapid technological changes, these days collaborative filtering-based recommender systems are being widely used worldwide. Collaborative filtering approach is more vulnerable from being attacked because of its open nature. The attackers may rate the fake ratings to disturb the systems. In this paper, unsupervised Kohonen Self-Organizing Map (KSOM) clustering technique is used to make a better detection between genuine and fake profiles to reduce profile injection attacks and compared with existing techniques Enhanced Clustering Large Applications Based on Randomized Search (ECLARANS) and Partition Around Medoids (PAM) with variants of attack size. It has been noticed that KSOM outperforms over ECLARANS and PAM techniques with good outlier accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    “MovieLens dataset” available at https://movielens.org/ accessed on April 12, 2018.

    In ECLARANS algorithm, the following size of clusters has been generated which is shown in Fig. 2. Here, we see that cluster A and cluster B are small-size clusters in Table 2. This can be seen that user is included in clusters A and B considering the attack profiles.

References

  1. Aggarwal, C.C.: An Introduction to recommender systems (The Textbook), vol. XXI, 1st edn., 498p. Springer International Publishing, Cham (2016). ISBN: 978-3-319-29657-9

    Google Scholar 

  2. Chakraborty, P.: A scalable collaborative filtering based recommender system using incremental clustering. In: IEEE International Advance Computing Conference, Patiala, India, 6–7 March (2009)

    Google Scholar 

  3. Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Detecting profile injection attacks in collaborative recommender systems. In: Proceedings of the 8th IEEE International Conference on E-Commerce Technology and the 3rd IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (2006)

    Google Scholar 

  4. Aghili, G., Shajari, M., Khadivi, S., Morid, M.A.: Using genre interest of users to detect profile injection attacks in movie recommender systems. In: Proceeding of IEEE International Conference on Machine Learning and Applications (2011)

    Google Scholar 

  5. Bryan, K., O’Mahony, M., Cunningham, P.: Unsupervised retrieval of attack profiles in collaborative recommender systems. Technical Report UCD-CSI2008-03, University College Dublin (2008)

    Google Scholar 

  6. Dhimmar, J.H., Chauhan, R.: An accuracy improvement of detection of profile injection attacks in recommender systems using outlier analysis. Int. J. Comput. Appl. (0975–8887) 122(10), (2015)

    Google Scholar 

  7. Chakraborty, P., Karforma, S.: Detection of profile-injection attacks in recommender systems using outlier analysis. In: International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), Procedia Technology, vol. 10 (2013)

    Article  Google Scholar 

  8. Toor, A.K., Singh, A.: Analysis of clustering algorithm based on number of clusters, error rate, computation time and map topology on large data set. IJETTCS 2(6), 94–98 (2013)

    Google Scholar 

  9. Sinwar, D., Kumar, S., Dr.: Study of different clustering approaches for outlier detection. IJCSC 4(2), 51–54 (2013)

    Google Scholar 

  10. Hurley, N., Cheng, Z., Zhang, M.: Statistical Attack RecSys’09, 23–25 October 2009. ACM, New York (2009). 978-1-60558-435- 5/09/10

    Google Scholar 

  11. Bilge, A., Ozdemir, Z., Polat, H.: A novel shilling attack detection method. In: Information Technology and Quantitative Management, ITQM 2014 (Proc. Comput. Sci. 2014, 165–174) (2014). https://doi.org/10.1016/j.procs.2014.05.257

    Article  Google Scholar 

  12. Dan, J., Jianlinet, Q., Xiang, G., Li, C., Peng, H.: a synthesized data mining algorithm based on clustering and decision tree. In: 10th IEEE International Conference on Computer and Information Technology (CIT 2010)

    Google Scholar 

  13. Ai, H., Li, W.: K-means initial clustering center optimal algorithm based on estimating density and refining initial. IEEE (2012)

    Google Scholar 

  14. Hurley, N., Cheng, Z., Zhang, M.: Statistical attack detection. In: Proceedings of the Third ACM Conference on Recommender Systems, pp. 149–156. ACM (2009)

    Google Scholar 

  15. Kriegel, H.-P., Schubert, M., Zimek, A.: Angle-based outlier detection in high dimensional data. In: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, NY, USA, pp. 444–452 (2008)

    Google Scholar 

  16. Al-Zoubi, M.B.: An effective clustering based approach for outlier detection. Eur. J. Sci. Res. 28(2), 310–316 (2009)

    Google Scholar 

  17. Vesanto, J., Alhoniemi, E.: Clustering of the self organizing map. IEEE Trans. Neural Netw. 11(3), 586–600 (2000)

    Article  Google Scholar 

  18. Mishra, M., Behera, H.S.: Kohonen self organizing map with modified K-means clustering for high dimensional data set. Int. J. Appl. Inf. Syst. 2(3), 34–39 (2012)

    Google Scholar 

  19. WEKA 3. https://www.cs.waikato.ac.nz/ml/weka/. Accessed 13 Dec 2017

  20. MATLAB 9.0. https://in.mathworks.com/. Accessed on 13 Jan 2018

Download references

Acknowledgements

I give my warm thanks to Dr. Veer Sain Dixit as research supervisor for his idea about SOM and encouragement of writing this paper. Without his valuable support, this work is not possible toward enhancement in the knowledge about profile injection attack detection.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anjani Kumar Verma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Verma, A.K., Dixit, V.S. (2020). An Outlier Accuracy Improvement in Shilling Attacks Using KSOM. In: Choudhury, S., Mishra, R., Mishra, R., Kumar, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 989. Springer, Singapore. https://doi.org/10.1007/978-981-13-8618-3_38

Download citation

Publish with us

Policies and ethics