6 research outputs found
μ 보 μμ€μ μ΄μ©ν κ°κ±΄ν μλΉκ³΅κ²© λ°©μ΄ μκ³ λ¦¬μ¦ μ€κ³ λ° λΆμ
νμλ
Όλ¬Έ (λ°μ¬)-- μμΈλνκ΅ λνμ : μ κΈ°Β·μ»΄ν¨ν°κ³΅νλΆ, 2014. 8. κΉμ’
κΆ.μΆμ² μμ€ν
(Recommender System, RS)μ κΆκ·Ήμ μΈ μλΉμ (μ¦, μΆμ² μμ€ν
μ¬μ©μ)μκ² μμ
μ μΈ μμ΄ν
λ€μ μΆμ²ν΄ μ£Όλ κ²μ΄ μ£Όμ κΈ°λ₯μ΄λ€. μΆμ² μμ€ν
μμ μ νν μ 보λ₯Ό μ 곡νλ κ²μ μΆμ² μλΉμ€ 곡κΈμμ μμ€ν
μ¬μ©μ λͺ¨λμκ² μ€μνλ€. μ¨λΌμΈ μμ
λ€νΈμν¬μ νμ°μΌλ‘ μΆμ² μμ€ν
μ μν₯λ ₯μ κΈκ²©ν μ¦κ°νκ³ μλ€. λ°λ©΄μ μΆμ² μμ€ν
μ μλμλ λ°λλ‘ μ 보λ₯Ό μ‘°μνλ κ±°μ§ μμ΄λ΄ν°ν°λ€μ μ¬μ©ν μ
μμ μΈ μ¬μ©μλ€μ μΆμ² μμ€ν
μ λν κ³΅κ²©μ΄ μ¦κ°νκ³ μλ€. μ΄λ¬ν κ±°μ§ μμ΄λ΄ν°ν°λ€μ νμ©ν 곡격μ μλΉ(Sybil) 곡격μ΄λΌ λΆλ₯Έλ€. λ³Έ λ
Όλ¬Έμμλ λ€λ₯Έ μ°κ΅¬μμ μκ°λ μ μ΄ μλ μ΄λλ―Έμ
ν΅μ κ°λ
μ νμ©ν RobuRecμ΄λΌ λΆλ¦¬λ μλ‘μ΄ κ°κ±΄ν μΆμ² μμ€ν
μ μ μνλ€. μ΄λλ―Έμ
ν΅μ λΌλ κ°λ ₯ν κ°λ
μ νμ©νμ¬ μ μ§ν μ¬μ©μκ° μμ±ν νκ°μΈμ§ νΉμ μλΉ μμ΄λ΄ν°ν°λ€μ νμ©ν μ
μμ μΈ νκ°μΈμ§μ κ΄κ³μμ΄ κ³ μ λ’° μμ€μ μΆμ²μ μμΈ‘ν μ μλ€. RobuRec μμ€ν
μ μ±λ₯μ 보μ΄κΈ° μν΄, λ³Έ λ
Όλ¬Έμμλ μ¬λ¬κ°μ§ κ°λ₯ν μλΉ κ³΅κ²© μλ리μ€λ λ¬Όλ‘ λ€μν λ°μ΄ν°μ
μ νμ©νμ¬ κ΄λ²μν μ€νμ μννμλ€. RobuRecμ μ€ν λ° λΆμμ ν΅ν΄ RobuRecκ³Ό λΉκ΅ κ°λ₯ν PCA (Principal Component Analysis) λ°©μ λ° LTSMF (Least Trimmed Squared Matrix Factorization) λ°©μλ³΄λ€ ν리λμ
μ¬ννΈ (Prediction Shift, PS) λ° μ μ€ λΉμ¨(Hit Ratio, HR)μμ μλ±ν μ±λ₯μ λ³΄μ¬ μ£Όμλ€.As the major function of Recommender Systems (RSs) is recommending commercial items to potential consumers (i.e., system users), providing correct information
of RS is crucial to both RS providers and system users. The influence of RS over Online Social Networks (OSNs) is expanding rapidly, whereas malicious users continuously
try to attack the RSs with fake identities (i.e., Sybils) by manipulating the information in the RS adversely. In this thesis, we propose a novel robust recommendation
algorithm called RobuRec which exploits a distinctive feature, admission control. RobuRec provides highly Trusted recommendation results since RobuRec predicts appropriate recommendations regardless of whether the ratings are given by honest users or by Sybils thanks to the power of admission control. To demonstrate the performance of RobuRec, we have conducted extensive exper
iments with various datasets as well as diverse attack scenarios. The evaluation results confirm that RobuRec outperforms the comparable schemes such as Principal
Component Analysis (PCA) and Least Trimmed Squared Matrix Factorization (LTSMF) significantly in terms of Prediction Shift (PS) and Hit Ratio (HR).Chapter 1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . 1
1.2 Goal and Contribution . . . . . . . . . . . . . . 3
1.3 Thesis Organization . . . . . . . . . . . . . . . 6
Chapter 2 Related Work 7
2.1 RS approaches . . . . . . . . . . . . . . . . . . 7
2.2 Sybil Attack Defense . . . . . . . . . . . . . . 9
2.3 Robust RS Approaches . . . . . . . . . . . . . . 10
Chapter 3 System Model 13
3.1 Target Applications . . . . . . . . . . . . . . 17
3.2 Strong Attacker . . . . . . . . . . . . . . . . 17
3.3 Attack Model . . . . . . . . . . . . . . . . . . 18
3.4 Model Assumptions . . . . . . . . . . . . . . . 21
Chapter 4 RobuRec Design 23
4.1 Algorithm Intuition . . . . . . . . . . . . . . 23
4.2 Initialization Phase . . . . . . . . . . . . . . 25
4.3 Admission Control Phase . . . . . . . . . . . . 26
4.4 Rating Prediction Phase . . . . . . . . . . . . 30
4.5 Dynamic Parameter Control . . . . . . . . . . . 35
4.5.1 Simplifying Control Parameters . . . . . . . . 36
4.5.2 Dynamic Cmax Control . . . . . . . . . . . . . 37
4.5.3 Dynamic Global and Local Control . . . . . . 42
Chapter 5 Evaluation and Analysis 45
5.1 Evaluation Metrics . . . . . . . . . . . . . . . 45
5.2 Parameter (alpha) Study . . . . . . . . . . . . 47
5.3 Datasets and Setup . . . . . . . . . . . . . . . 48
5.4 Results and Analysis . . . . . . . . . . . . . . 52
5.4.1 Performance on PS . . . . . . . . . . . . . . 52
5.4.2 Impact of Filler Size . . . . . . . . . . . . 55
5.4.3 Impact of Target Selection Strategy . . . . . 58
5.4.4 Dynamic Parameter Control . . . . . . . . . . 59
5.4.5 Performance on HR . . . . . . . . . . . . . . 62
5.4.6 Analysis on Escaping Probability . . . . . . . 63
Chapter 6 Conclusion 67Docto
Unsupervised Retrieval of Attack Profiles in Collaborative Recommender Systems
Trust, reputation and recommendation are key components of successful ecommerce systems. However, ecommerce systems are also vulnerable in this respect because there are opportunities for sellers to gain advantage through manipulation of reputation and recommendation. One such vulnerability is the use of fraudulent user profiles to boost (or damage) the ratings of items in an online recommender system. In this paper we cast this problem as a problem of detecting anomalous structure in network analysis and propose a novel mechanism for detecting this anomalous structure. We present an evaluation that shows that this approach is effective at uncovering the types of recommender systems attack described in the literature.Science Foundation Irelan