104 research outputs found
μ 보 μμ€μ μ΄μ©ν κ°κ±΄ν μλΉκ³΅κ²© λ°©μ΄ μκ³ λ¦¬μ¦ μ€κ³ λ° λΆμ
νμλ
Όλ¬Έ (λ°μ¬)-- μμΈλνκ΅ λνμ : μ κΈ°Β·μ»΄ν¨ν°κ³΅νλΆ, 2014. 8. κΉμ’
κΆ.μΆμ² μμ€ν
(Recommender System, RS)μ κΆκ·Ήμ μΈ μλΉμ (μ¦, μΆμ² μμ€ν
μ¬μ©μ)μκ² μμ
μ μΈ μμ΄ν
λ€μ μΆμ²ν΄ μ£Όλ κ²μ΄ μ£Όμ κΈ°λ₯μ΄λ€. μΆμ² μμ€ν
μμ μ νν μ 보λ₯Ό μ 곡νλ κ²μ μΆμ² μλΉμ€ 곡κΈμμ μμ€ν
μ¬μ©μ λͺ¨λμκ² μ€μνλ€. μ¨λΌμΈ μμ
λ€νΈμν¬μ νμ°μΌλ‘ μΆμ² μμ€ν
μ μν₯λ ₯μ κΈκ²©ν μ¦κ°νκ³ μλ€. λ°λ©΄μ μΆμ² μμ€ν
μ μλμλ λ°λλ‘ μ 보λ₯Ό μ‘°μνλ κ±°μ§ μμ΄λ΄ν°ν°λ€μ μ¬μ©ν μ
μμ μΈ μ¬μ©μλ€μ μΆμ² μμ€ν
μ λν κ³΅κ²©μ΄ μ¦κ°νκ³ μλ€. μ΄λ¬ν κ±°μ§ μμ΄λ΄ν°ν°λ€μ νμ©ν 곡격μ μλΉ(Sybil) 곡격μ΄λΌ λΆλ₯Έλ€. λ³Έ λ
Όλ¬Έμμλ λ€λ₯Έ μ°κ΅¬μμ μκ°λ μ μ΄ μλ μ΄λλ―Έμ
ν΅μ κ°λ
μ νμ©ν RobuRecμ΄λΌ λΆλ¦¬λ μλ‘μ΄ κ°κ±΄ν μΆμ² μμ€ν
μ μ μνλ€. μ΄λλ―Έμ
ν΅μ λΌλ κ°λ ₯ν κ°λ
μ νμ©νμ¬ μ μ§ν μ¬μ©μκ° μμ±ν νκ°μΈμ§ νΉμ μλΉ μμ΄λ΄ν°ν°λ€μ νμ©ν μ
μμ μΈ νκ°μΈμ§μ κ΄κ³μμ΄ κ³ μ λ’° μμ€μ μΆμ²μ μμΈ‘ν μ μλ€. RobuRec μμ€ν
μ μ±λ₯μ 보μ΄κΈ° μν΄, λ³Έ λ
Όλ¬Έμμλ μ¬λ¬κ°μ§ κ°λ₯ν μλΉ κ³΅κ²© μλ리μ€λ λ¬Όλ‘ λ€μν λ°μ΄ν°μ
μ νμ©νμ¬ κ΄λ²μν μ€νμ μννμλ€. RobuRecμ μ€ν λ° λΆμμ ν΅ν΄ RobuRecκ³Ό λΉκ΅ κ°λ₯ν PCA (Principal Component Analysis) λ°©μ λ° LTSMF (Least Trimmed Squared Matrix Factorization) λ°©μλ³΄λ€ ν리λμ
μ¬ννΈ (Prediction Shift, PS) λ° μ μ€ λΉμ¨(Hit Ratio, HR)μμ μλ±ν μ±λ₯μ λ³΄μ¬ μ£Όμλ€.As the major function of Recommender Systems (RSs) is recommending commercial items to potential consumers (i.e., system users), providing correct information
of RS is crucial to both RS providers and system users. The influence of RS over Online Social Networks (OSNs) is expanding rapidly, whereas malicious users continuously
try to attack the RSs with fake identities (i.e., Sybils) by manipulating the information in the RS adversely. In this thesis, we propose a novel robust recommendation
algorithm called RobuRec which exploits a distinctive feature, admission control. RobuRec provides highly Trusted recommendation results since RobuRec predicts appropriate recommendations regardless of whether the ratings are given by honest users or by Sybils thanks to the power of admission control. To demonstrate the performance of RobuRec, we have conducted extensive exper
iments with various datasets as well as diverse attack scenarios. The evaluation results confirm that RobuRec outperforms the comparable schemes such as Principal
Component Analysis (PCA) and Least Trimmed Squared Matrix Factorization (LTSMF) significantly in terms of Prediction Shift (PS) and Hit Ratio (HR).Chapter 1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . 1
1.2 Goal and Contribution . . . . . . . . . . . . . . 3
1.3 Thesis Organization . . . . . . . . . . . . . . . 6
Chapter 2 Related Work 7
2.1 RS approaches . . . . . . . . . . . . . . . . . . 7
2.2 Sybil Attack Defense . . . . . . . . . . . . . . 9
2.3 Robust RS Approaches . . . . . . . . . . . . . . 10
Chapter 3 System Model 13
3.1 Target Applications . . . . . . . . . . . . . . 17
3.2 Strong Attacker . . . . . . . . . . . . . . . . 17
3.3 Attack Model . . . . . . . . . . . . . . . . . . 18
3.4 Model Assumptions . . . . . . . . . . . . . . . 21
Chapter 4 RobuRec Design 23
4.1 Algorithm Intuition . . . . . . . . . . . . . . 23
4.2 Initialization Phase . . . . . . . . . . . . . . 25
4.3 Admission Control Phase . . . . . . . . . . . . 26
4.4 Rating Prediction Phase . . . . . . . . . . . . 30
4.5 Dynamic Parameter Control . . . . . . . . . . . 35
4.5.1 Simplifying Control Parameters . . . . . . . . 36
4.5.2 Dynamic Cmax Control . . . . . . . . . . . . . 37
4.5.3 Dynamic Global and Local Control . . . . . . 42
Chapter 5 Evaluation and Analysis 45
5.1 Evaluation Metrics . . . . . . . . . . . . . . . 45
5.2 Parameter (alpha) Study . . . . . . . . . . . . 47
5.3 Datasets and Setup . . . . . . . . . . . . . . . 48
5.4 Results and Analysis . . . . . . . . . . . . . . 52
5.4.1 Performance on PS . . . . . . . . . . . . . . 52
5.4.2 Impact of Filler Size . . . . . . . . . . . . 55
5.4.3 Impact of Target Selection Strategy . . . . . 58
5.4.4 Dynamic Parameter Control . . . . . . . . . . 59
5.4.5 Performance on HR . . . . . . . . . . . . . . 62
5.4.6 Analysis on Escaping Probability . . . . . . . 63
Chapter 6 Conclusion 67Docto
SocialLink: a Social Network Based Trust System for P2P File Sharing Systems
In peer-to-peer (P2P) file sharing systems, many autonomous peers without preexisting trust relationships share files with each other. Due to their open environment and distributed structure, these systems are vulnerable to the significant impact from selfish and misbehaving nodes. Free-riding, whitewash, collusion and Sybil attacks are common and serious threats, which severely harm non-malicious users and degrade the system performance. Many trust systems were proposed for P2P file sharing systems to encourage cooperative behaviors and punish non-cooperative behaviors. However, querying reputation values usually generates latency and overhead for every user. To address this problem, a social network based trust system (i.e., SocialTrust) was proposed that enables nodes to first request files from friends without reputation value querying since social friends are trustable, and then use trust systems upon friend querying failure when a node\u27s friends do not have its queried file. However, trust systems and SocialTrust cannot effectively deal with free-riding, whitewash, collusion and Sybil attacks. To handle these problems, in this thesis, we introduce a novel trust system, called SocialLink, for P2P file sharing systems. By enabling nodes to maintain personal social network with trustworthy friends, SocialLink encourages nodes to directly share files between friends without querying reputations and hence reduces reputation querying cost. To guarantee the quality of service (QoS) of file provisions from non-friends, SocialLink establishes directionally weighted links from the server to the client with successful file transaction history to constitute a weighted transaction network , in which the link weight is the size of the transferred file. In this way, SocialLink prevents potential fraudulent transactions (i.e., low-QoS file provision) and encourages nodes to contribute files to non-friends. By constraining the connections between malicious nodes and non-malicious nodes in the weighted transaction network, SocialLink mitigates the adverse effect from whitewash, collusion and Sybil attacks. By simulating experiments, we demonstrate that SocialLink efficiently saves querying cost, reduces free-riding, and prevents damage from whitewash, collusion and Sybil attacks
A Trust Management Framework for Decision Support Systems
In the era of information explosion, it is critical to develop a framework which can extract useful information and help people to make βeducatedβ decisions. In our lives, whether we are aware of it, trust has turned out to be very helpful for us to make decisions. At the same time, cognitive trust, especially in large systems, such as Facebook, Twitter, and so on, needs support from computer systems. Therefore, we need a framework that can effectively, but also intuitively, let people express their trust, and enable the system to automatically and securely summarize the massive amounts of trust information, so that a user of the system can make βeducatedβ decisions, or at least not blind decisions. Inspired by the similarities between human trust and physical measurements, this dissertation proposes a measurement theory based trust management framework. It consists of three phases: trust modeling, trust inference, and decision making. Instead of proposing specific trust inference formulas, this dissertation proposes a fundamental framework which is flexible and can be adapted by many different inference formulas. Validation experiments are done on two data sets: the Epinions.com data set and the Twitter data set. This dissertation also adapts the measurement theory based trust management framework for two decision support applications. In the first application, the real stock market data is used as ground truth for the measurement theory based trust management framework. Basically, the correlation between the sentiment expressed on Twitter and stock market data is measured. Compared with existing works which do not differentiate tweetsβ authors, this dissertation analyzes trust among stock investors on Twitter and uses the trust network to differentiate tweetsβ authors. The results show that by using the measurement theory based trust framework, Twitter sentiment valence is able to reflect abnormal stock returns better than treating all the authors as equally important or weighting them by their number of followers. In the second application, the measurement theory based trust management framework is used to help to detect and prevent from being attacked in cloud computing scenarios. In this application, each single flow is treated as a measurement. The simulation results show that the measurement theory based trust management framework is able to provide guidance for cloud administrators and customers to make decisions, e.g. migrating tasks from suspect nodes to trustworthy nodes, dynamically allocating resources according to trust information, and managing the trade-off between the degree of redundancy and the cost of resources
Web3Recommend: Decentralised recommendations with trust and relevance
Web3Recommend is a decentralized Social Recommender System implementation
that enables Web3 Platforms on Android to generate recommendations that balance
trust and relevance. Generating recommendations in decentralized networks is a
non-trivial problem because these networks lack a global perspective due to the
absence of a central authority. Further, decentralized networks are prone to
Sybil Attacks in which a single malicious user can generate multiple fake or
Sybil identities. Web3Recommend relies on a novel graph-based content
recommendation design inspired by GraphJet, a recommendation system used in
Twitter enhanced with MeritRank, a decentralized reputation scheme that
provides Sybil-resistance to the system. By adding MeritRank's decay parameters
to the vanilla Social Recommender Systems' personalized SALSA graph algorithm,
we can provide theoretical guarantees against Sybil Attacks in the generated
recommendations. Similar to GraphJet, we focus on generating real-time
recommendations by only acting on recent interactions in the social network,
allowing us to cater temporally contextual recommendations while keeping a
tight bound on the memory usage in resource-constrained devices, allowing for a
seamless user experience. As a proof-of-concept, we integrate our system with
MusicDAO, an open-source Web3 music-sharing platform, to generate personalized,
real-time recommendations. Thus, we provide the first Sybil-resistant Social
Recommender System, allowing real-time recommendations beyond classic
user-based collaborative filtering. The system is also rigorously tested with
extensive unit and integration tests. Further, our experiments demonstrate the
trust-relevance balance of recommendations against multiple adversarial
strategies in a test network generated using data from real music platforms
- β¦