Abstract
Due to the rapid technological changes, these days collaborative filtering-based recommender systems are being widely used worldwide. Collaborative filtering approach is more vulnerable from being attacked because of its open nature. The attackers may rate the fake ratings to disturb the systems. In this paper, unsupervised Kohonen Self-Organizing Map (KSOM) clustering technique is used to make a better detection between genuine and fake profiles to reduce profile injection attacks and compared with existing techniques Enhanced Clustering Large Applications Based on Randomized Search (ECLARANS) and Partition Around Medoids (PAM) with variants of attack size. It has been noticed that KSOM outperforms over ECLARANS and PAM techniques with good outlier accuracy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
“MovieLens dataset” available at https://movielens.org/ accessed on April 12, 2018.
In ECLARANS algorithm, the following size of clusters has been generated which is shown in Fig. 2. Here, we see that cluster A and cluster B are small-size clusters in Table 2. This can be seen that user is included in clusters A and B considering the attack profiles.
References
Aggarwal, C.C.: An Introduction to recommender systems (The Textbook), vol. XXI, 1st edn., 498p. Springer International Publishing, Cham (2016). ISBN: 978-3-319-29657-9
Chakraborty, P.: A scalable collaborative filtering based recommender system using incremental clustering. In: IEEE International Advance Computing Conference, Patiala, India, 6–7 March (2009)
Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Detecting profile injection attacks in collaborative recommender systems. In: Proceedings of the 8th IEEE International Conference on E-Commerce Technology and the 3rd IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (2006)
Aghili, G., Shajari, M., Khadivi, S., Morid, M.A.: Using genre interest of users to detect profile injection attacks in movie recommender systems. In: Proceeding of IEEE International Conference on Machine Learning and Applications (2011)
Bryan, K., O’Mahony, M., Cunningham, P.: Unsupervised retrieval of attack profiles in collaborative recommender systems. Technical Report UCD-CSI2008-03, University College Dublin (2008)
Dhimmar, J.H., Chauhan, R.: An accuracy improvement of detection of profile injection attacks in recommender systems using outlier analysis. Int. J. Comput. Appl. (0975–8887) 122(10), (2015)
Chakraborty, P., Karforma, S.: Detection of profile-injection attacks in recommender systems using outlier analysis. In: International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), Procedia Technology, vol. 10 (2013)
Toor, A.K., Singh, A.: Analysis of clustering algorithm based on number of clusters, error rate, computation time and map topology on large data set. IJETTCS 2(6), 94–98 (2013)
Sinwar, D., Kumar, S., Dr.: Study of different clustering approaches for outlier detection. IJCSC 4(2), 51–54 (2013)
Hurley, N., Cheng, Z., Zhang, M.: Statistical Attack RecSys’09, 23–25 October 2009. ACM, New York (2009). 978-1-60558-435- 5/09/10
Bilge, A., Ozdemir, Z., Polat, H.: A novel shilling attack detection method. In: Information Technology and Quantitative Management, ITQM 2014 (Proc. Comput. Sci. 2014, 165–174) (2014). https://doi.org/10.1016/j.procs.2014.05.257
Dan, J., Jianlinet, Q., Xiang, G., Li, C., Peng, H.: a synthesized data mining algorithm based on clustering and decision tree. In: 10th IEEE International Conference on Computer and Information Technology (CIT 2010)
Ai, H., Li, W.: K-means initial clustering center optimal algorithm based on estimating density and refining initial. IEEE (2012)
Hurley, N., Cheng, Z., Zhang, M.: Statistical attack detection. In: Proceedings of the Third ACM Conference on Recommender Systems, pp. 149–156. ACM (2009)
Kriegel, H.-P., Schubert, M., Zimek, A.: Angle-based outlier detection in high dimensional data. In: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, NY, USA, pp. 444–452 (2008)
Al-Zoubi, M.B.: An effective clustering based approach for outlier detection. Eur. J. Sci. Res. 28(2), 310–316 (2009)
Vesanto, J., Alhoniemi, E.: Clustering of the self organizing map. IEEE Trans. Neural Netw. 11(3), 586–600 (2000)
Mishra, M., Behera, H.S.: Kohonen self organizing map with modified K-means clustering for high dimensional data set. Int. J. Appl. Inf. Syst. 2(3), 34–39 (2012)
WEKA 3. https://www.cs.waikato.ac.nz/ml/weka/. Accessed 13 Dec 2017
MATLAB 9.0. https://in.mathworks.com/. Accessed on 13 Jan 2018
Acknowledgements
I give my warm thanks to Dr. Veer Sain Dixit as research supervisor for his idea about SOM and encouragement of writing this paper. Without his valuable support, this work is not possible toward enhancement in the knowledge about profile injection attack detection.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Verma, A.K., Dixit, V.S. (2020). An Outlier Accuracy Improvement in Shilling Attacks Using KSOM. In: Choudhury, S., Mishra, R., Mishra, R., Kumar, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 989. Springer, Singapore. https://doi.org/10.1007/978-981-13-8618-3_38
Download citation
DOI: https://doi.org/10.1007/978-981-13-8618-3_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8617-6
Online ISBN: 978-981-13-8618-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)