SlideShare a Scribd company logo
SUBMITTED BY:-KARAN GOYAL
9911103474
F-3
Shilling Attacks on
Recommender Systems
Introduction
 One area of research which has recently gained importance is the
security of Recommender Systems. Recommender Systems are
widely used to help deal with the problem of information overload,
by making personalized recommendations for information, products
and services during a live interaction.
 In recent years, Automated Collaborative Filtering (ACF) has been
successfully employed in them in order to help users deal with the
number of options available to them, by making high quality
recommendations.
 Recommender Systems are not beneficial only to the consumers of
the product but also to the retail companies that produce those
products, since recommendations of their products will in turn result
in increased sales and customer satisfaction.
Existing Problems
 However, the open nature of these systems make them vulnerable to
Shilling attacks in which malicious users may influence the system by
inserting biased data into the system, in order to push the prediction
of some targeted items.
 Unscrupulous producers attack such systems to have their products
recommended more often than those of their competitors.
 They hire agents called shills that manipulate the system by giving
false opinion about the target products and mislead the consumers.
 Such attacks may lead to erosion of user’s trust in the objectivity and
accuracy of the system.
An attack against a collaborative filtering recommender system consists of a set
of attack profiles, each containing biased rating data associated with a fictitious
user identity, and including a target item to be promoted or demoted. Profile
injection attacks can be categorized based on the knowledge required by the
attacker to mount the attack, the intent of a particular attack, and the size of the
attack. From the perspective of the attacker, the best
A second dimension of an attack is the intent of an attacker.Two simple intents
are push and nuke. An attacker may insert profiles to make a product more likely
(push) or less likely (nuke) to be recommended.
 Push Attack Models:
Two basic Push attack models are the random and average attack models. Both
of these attack models involve the generation of attack profiles using randomly
assigned ratings to the filler items in the profile. In the random attack the
assigned ratings are based on the overall distribution of user ratings in the
database, while in the average attack the rating for each filler item is computed
based on its average rating for all users.
 Nuke Attack Models:
Random and average attack models can also be used for nuking a target item.
This can be accomplished by associating minimum-rating with the target item
instead of maximum-rating, as in push attack models. However, attack models
that are effective for pushing items are not necessarily effective for nuke attacks.
Another possible aim of an attacker might be simple vandalism—to make the
entire system functions poorly. Our work here assumes a more focused economic
motivation on the part of the attacker, namely, that there is something to be
gained by promoting or demoting a particular product.We are concerned
primarily with the “win” for the attacker: the change in the predicted rating of the
attacked item.
Proposed Solution
 This paper focuses on the algorithms being used in recommender
systems, effectiveness of the shilling attacks on recommender
systems and detect ability of these attacks
 Recommender Systems are a powerful new technology for
extracting additional value for a business from its user databases.
Some conclusions have been drawn that prevent shilling attacks
on the systems.
They Are:-
 Prefer item-item: Results show that item-based techniques hold the
promise of allowing collaborative-based algorithms to scale to large
datasets and at the same time produce high-quality
recommendations. The shilling attacks are more effective in the case
of item-item algorithms than user-user.
 Use recommendation metrics: The paper proposed and investigated
the use of statistical metrics for detecting the patterns of shilling
attacks in a recommender system. MovieLens database has been
evaluated by these metrics and it is shown that the attackers do
indeed exhibit special, noticeable patterns.
 Watch Metrics but worry anyway The lower the MAE, the more
accurately the recommendations engine predicts user ratings.
Although MAE is a standard for evaluating the effectiveness of the ACF
algorithms, it is not of much use to the end users since it generally
gives the users a predicted rating of an item whereas the users prefer
system based recommendations.
 Protect new items: Attacks that target recommendation frequency of
low-information items (i.e. ones with few ratings) are more effective
than attacks against high-information items. Thus, new items tend to
get attacked more easily. It is in an attacker's best interest to restrict
the effect of an attack to a small target set of items in order to be more
subtle and try to avoid detection by the system operators.
Implementation details and
issues
ACF ALGORITHMSUSED
Collaborative filtering (CF) is the process of filtering for information or patterns using
techniques involving collaboration among multiple agents, viewpoints, data sources,
etc. It’s a method of making automatic predictions (filtering) about the interests of a
user by collecting taste information from many users (collaborating). Applications of
collaborative filtering typically involve very large data sets. Collaborative filtering
methods have been applied to many different kinds of data including sensing and
monitoring data - such as in mineral exploration, environmental sensing over large
areas or multiple sensors. The underlying assumption of CF approach is that those
who agreed in the past tend to agree again in the future. Collaborative filtering has
the advantage that such interactions can be scaled to groups of thousands or even
millions.
The paper largely focuses on personalized recommender systems. In particular ones
that use automated collaborative filtering (ACF), which refers to algorithms that
generate recommendations on the basis that people who have expressed similar
opinions in the past are likely to share opinions in the future. These algorithms
produce recommendations based on the intuition that similar users have similar
tastes. That is, people who you share common likes and dislikes with are likely to be a
good source for recommendations.
K-NN USER-USER
 K-NNUSER-USER
This algorithm belongs to the memory-based class of CF algorithms.The standard
collaborative filtering algorithm is based on user-to-user similarity. Predictions under
this algorithm are computed as a two step process. First, the similarities between the
target user and all other users who have rated the target item are computed — most
commonly using the Pearson correlation coefficient.Then the prediction for the
target item is computed using at most k closest users found from step one, and by
applying a weighted average of deviations from the selected users’ means.
 The user-user algorithm uses the following formula to compute a predicted rating p
for a user u on an item i.Here, ru is user u's average rating over all rated items, wu,v is
the mean-adjusted Pearson correlation (similarity) between users u and v, and Uu,i is
user u's neighbourhood with respect to item I and consists of the k users who have
rated i and have the greatest Pearson correlation with u. k is a tuneable parameter
and represents the number of neighbours.
 K-NN ITEM-ITEM
This algorithm is also an instance of a memory-based approach. Predictions
are computed by first computing item-item similarities.Once the item-item
similarities are computed, the rating space of the target user is examined to
find all the rated items similar to the target item.The weighted average is
then performed that generates the prediction.Typically, a threshold of k
similar items are used rather than all.The formula used to compute a
prediction in item-item is:
Where J is the set of k similar items, ru,j is the prediction for the user on item j,
and simI,j is the similarity between items i and j.
HYPOTHESES
 HYPOTHESIS 1: Different ACF algorithms respond differently to
shilling attacks.
 HYPOTHESIS 2: Shilling attacks affect recommender algorithms
differently from prediction algorithms.
 HYPOTHESIS 3: Shilling attacks are not detectable using traditional
measures of algorithm performance.
 HYPOTHESIS 4 : Ratings distribution of the target item influences
attack effectiveness.
METHODS
A total of twenty-four experiments were performed in
a 2x2x2x3 design.The algorithm (user-user or item-
item), attack type (AverageBot or RandomBot), attack
intent (nuke or push), and number of new users/bots
(25, 50, or 100) were varied in each experiment.The
target set for the experiments consists of 22 items.This
set was selected to include a variety of different movie
types including future releases, new releases, obscure
films, popular films, controversial films, and long-
standing favorites. In terms of ratings properties, this
selection of items represents a wide range of popularity
(number of ratings), entropy (a measure of the variance
of ratings), and likability (mean rating).Table 1 displays
the properties of items in the target set.
METRICS
Recommender systems research has used several types of measures for evaluating the
quality of a recommender system:
Mean Absolute Error (MAE) between ratings and predictions is a widely used metric. MAE
is a measure of the deviation of recommendations from their true user-specified values. For
each ratings-predictions pair <pi , qi > this metrics treats the absolute error between them
i.e. |pi - qi | equally.The MAE is computed by first summing these absolute errors of the N
corresponding ratings-predictions pairs and then computing the average. Formally,The
lower the MAE, the more accurately the recommendations engine predicts user ratings..
 TOP- N RECOMMENDATION ACCURACY Studies have shown that when given a
recommendation list, the users prefer to browse only the first few items of the list.This
phenomenon can be shown through the following two graphs.These figures show the
browse depth of 137991 MovieLens recommendation searches.
 Stability of Prediction (SOP):This particular model of robustness measures the power of a
recommender system to deliver stable predictions to users in the presence of an arbitrary
amount of inaccurate data in a system. As such, this model is independent of the “true”
ratings for the items over which SOP is calculated.
 Power of Attack (POA) is defined as the average change in prediction toward some target
value over all target users and items. It gives a positive value when the direction of
prediction shift is towards the target.
 Expected Top N Occupancy (exptopn): This metric helps to identify in determining the
expected number of times an item would occur in a top N recommendation list. For
example:The target items are E and F. the top 5 recommendation list is shown in the
following table
CONCLUSION
Recommender Systems are a powerful new technology for extracting additional
value for a business from its user databases. Some conclusions have been drawn
that prevent shilling attacks on the systems.
 Prefer item-item: Results show that item-based techniques hold the promise of
allowing collaborative-based algorithms to scale to large datasets and at the
same time produce high-quality recommendations.The shilling attacks are more
effective in the case of item-item algorithms than user-user.
 Use recommendation metrics:This paper proposed and investigated the use of
statistical metrics for detecting the patterns of shilling attacks in a recommender
system. MovieLens database has been evaluated by these metrics and it is
shown that the attackers do indeed exhibit special, noticeable patterns.
 Watch Metrics but worry anyway:There has been considerable research in the
area of recommender systems evaluation. Some of these concepts can also be
applied to the evaluation of the security of recommender systems, but in
evaluating security, topic of interest is not the raw performance, but rather the
change in performance induced by an attack. A strong prediction shift is not a
guarantee that an item will be recommended— it is possible that other items’
scores are affected by an attack as well or that the item scores so low to begin
with that even a significant shift does not promote it to recommended status.
The lower the MAE, the more accurately the recommendations engine predicts
user ratings.Although MAE is a standard for evaluating the effectiveness of the
ACF algorithms, it is not of much use to the end users since it generally gives the
users a predicted rating of an item whereas the users prefer system based
recommendations.
 Protect new items:Attacks that target recommendation frequency of
low-information items (i.e. ones with few ratings) are more effective
than attacks against high-information items.Thus, new items tend to
get attacked more easily. It is in an attacker's best interest to restrict
the effect of an attack to a small target set of items in order to be
more subtle and try to avoid detection by the system operators.
 Rest of the paper talks of intrinsic properties of shilling attacks (i.e.
Dimensions of attacks).Along the intent dimension, an attacker may
insert profiles to make a product more likely (push) or less likely (nuke)
to be recommended. Along the target dimension, Shill attacks can be
directed at a particular subset of users or a subset of items in a
recommender system. Along the required knowledge dimension, it is
observed that the attacks that target recommendation frequency of
low-information items are more effective than attacks against high-
information items. Along the cost dimension, there are two primary
components: knowledge cost and execution cost. Along the
dimension of algorithm dependence, Item-based collaborative filtering
might provide significant robustness compared to the user-based
algorithm.Along the detectability dimension, a considerable
complication in detecting shilling attacks is that it is difficult to
precisely and completely define the set of shilling attack patterns.

More Related Content

What's hot

Analysis, design and implementation of a Multi-Criteria Recommender System ba...
Analysis, design and implementation of a Multi-Criteria Recommender System ba...Analysis, design and implementation of a Multi-Criteria Recommender System ba...
Analysis, design and implementation of a Multi-Criteria Recommender System ba...
Davide Giannico
 
Movie recommendation system using collaborative filtering system
Movie recommendation system using collaborative filtering system Movie recommendation system using collaborative filtering system
Movie recommendation system using collaborative filtering system
Mauryasuraj98
 
Proceedings Template - WORD
Proceedings Template - WORDProceedings Template - WORD
Proceedings Template - WORD
butest
 
Amazon Product Review Sentiment Analysis with Machine Learning
Amazon Product Review Sentiment Analysis with Machine LearningAmazon Product Review Sentiment Analysis with Machine Learning
Amazon Product Review Sentiment Analysis with Machine Learning
ijtsrd
 
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsBenchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
IJNSA Journal
 
Multi Criteria Recommender Systems - Overview
Multi Criteria Recommender Systems - OverviewMulti Criteria Recommender Systems - Overview
Multi Criteria Recommender Systems - Overview
Davide Giannico
 
Movies recommendation system in R Studio, Machine learning
Movies recommendation system in  R Studio, Machine learning Movies recommendation system in  R Studio, Machine learning
Movies recommendation system in R Studio, Machine learning
Mauryasuraj98
 
Project presentation
Project presentationProject presentation
Project presentation
Shivarshi Bajpai
 
Novel Algorithms for Ranking and Suggesting True Popular Items
Novel Algorithms for Ranking and Suggesting True Popular ItemsNovel Algorithms for Ranking and Suggesting True Popular Items
Novel Algorithms for Ranking and Suggesting True Popular Items
IJMER
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
Venkat Projects
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Recommendation System Explained
Recommendation System ExplainedRecommendation System Explained
Recommendation System Explained
Crossing Minds
 
Item Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation AlgorithmsItem Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation Algorithms
nextlib
 
Ijmer 46067276
Ijmer 46067276Ijmer 46067276
Ijmer 46067276
IJMER
 
Typicality-Based Collaborative Filtering Recommendation
Typicality-Based Collaborative Filtering RecommendationTypicality-Based Collaborative Filtering Recommendation
Typicality-Based Collaborative Filtering Recommendation
Papitha Velumani
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
Lior Rokach
 
Recommendation system
Recommendation systemRecommendation system
Recommendation system
Rishabh Mehta
 
Movies Recommendation System
Movies Recommendation SystemMovies Recommendation System
Movies Recommendation System
Shubham Patil
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
IRJET Journal
 

What's hot (19)

Analysis, design and implementation of a Multi-Criteria Recommender System ba...
Analysis, design and implementation of a Multi-Criteria Recommender System ba...Analysis, design and implementation of a Multi-Criteria Recommender System ba...
Analysis, design and implementation of a Multi-Criteria Recommender System ba...
 
Movie recommendation system using collaborative filtering system
Movie recommendation system using collaborative filtering system Movie recommendation system using collaborative filtering system
Movie recommendation system using collaborative filtering system
 
Proceedings Template - WORD
Proceedings Template - WORDProceedings Template - WORD
Proceedings Template - WORD
 
Amazon Product Review Sentiment Analysis with Machine Learning
Amazon Product Review Sentiment Analysis with Machine LearningAmazon Product Review Sentiment Analysis with Machine Learning
Amazon Product Review Sentiment Analysis with Machine Learning
 
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection SolutionsBenchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions
 
Multi Criteria Recommender Systems - Overview
Multi Criteria Recommender Systems - OverviewMulti Criteria Recommender Systems - Overview
Multi Criteria Recommender Systems - Overview
 
Movies recommendation system in R Studio, Machine learning
Movies recommendation system in  R Studio, Machine learning Movies recommendation system in  R Studio, Machine learning
Movies recommendation system in R Studio, Machine learning
 
Project presentation
Project presentationProject presentation
Project presentation
 
Novel Algorithms for Ranking and Suggesting True Popular Items
Novel Algorithms for Ranking and Suggesting True Popular ItemsNovel Algorithms for Ranking and Suggesting True Popular Items
Novel Algorithms for Ranking and Suggesting True Popular Items
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Recommendation System Explained
Recommendation System ExplainedRecommendation System Explained
Recommendation System Explained
 
Item Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation AlgorithmsItem Based Collaborative Filtering Recommendation Algorithms
Item Based Collaborative Filtering Recommendation Algorithms
 
Ijmer 46067276
Ijmer 46067276Ijmer 46067276
Ijmer 46067276
 
Typicality-Based Collaborative Filtering Recommendation
Typicality-Based Collaborative Filtering RecommendationTypicality-Based Collaborative Filtering Recommendation
Typicality-Based Collaborative Filtering Recommendation
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Recommendation system
Recommendation systemRecommendation system
Recommendation system
 
Movies Recommendation System
Movies Recommendation SystemMovies Recommendation System
Movies Recommendation System
 
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...
 

Similar to Major

presentation
presentationpresentation
presentation
ASHISH PANNU
 
Collaborative Filtering Recommendation System
Collaborative Filtering Recommendation SystemCollaborative Filtering Recommendation System
Collaborative Filtering Recommendation System
Milind Gokhale
 
Analysing the performance of Recommendation System using different similarity...
Analysing the performance of Recommendation System using different similarity...Analysing the performance of Recommendation System using different similarity...
Analysing the performance of Recommendation System using different similarity...
IRJET Journal
 
Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...
Eswar Publications
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
vivatechijri
 
FIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemFIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation System
IJTET Journal
 
B1802021823
B1802021823B1802021823
B1802021823
IOSR Journals
 
243
243243
IRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User InterestIRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User Interest
IRJET Journal
 
IRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation SystemsIRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET Journal
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
Journal For Research
 
typicality-based collaborative filtering recommendation
typicality-based collaborative filtering recommendationtypicality-based collaborative filtering recommendation
typicality-based collaborative filtering recommendation
swathi78
 
SIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDY
SIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDYSIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDY
SIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDY
Journal For Research
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Editor IJAIEM
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Waqas Tariq
 
ENTERTAINMENT CONTENT RECOMMENDATION SYSTEM USING MACHINE LEARNING
ENTERTAINMENT CONTENT RECOMMENDATION SYSTEM USING MACHINE LEARNINGENTERTAINMENT CONTENT RECOMMENDATION SYSTEM USING MACHINE LEARNING
ENTERTAINMENT CONTENT RECOMMENDATION SYSTEM USING MACHINE LEARNING
IRJET Journal
 
IRJET- Book Recommendation System using Item Based Collaborative Filtering
IRJET- Book Recommendation System using Item Based Collaborative FilteringIRJET- Book Recommendation System using Item Based Collaborative Filtering
IRJET- Book Recommendation System using Item Based Collaborative Filtering
IRJET Journal
 
An Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
An Adaptive Framework for Enhancing Recommendation Using Hybrid TechniqueAn Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
An Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
ijcsit
 
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET Journal
 
Recommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association RulesRecommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association Rules
IJARIIE JOURNAL
 

Similar to Major (20)

presentation
presentationpresentation
presentation
 
Collaborative Filtering Recommendation System
Collaborative Filtering Recommendation SystemCollaborative Filtering Recommendation System
Collaborative Filtering Recommendation System
 
Analysing the performance of Recommendation System using different similarity...
Analysing the performance of Recommendation System using different similarity...Analysing the performance of Recommendation System using different similarity...
Analysing the performance of Recommendation System using different similarity...
 
Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...Investigation and application of Personalizing Recommender Systems based on A...
Investigation and application of Personalizing Recommender Systems based on A...
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
FIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemFIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation System
 
B1802021823
B1802021823B1802021823
B1802021823
 
243
243243
243
 
IRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User InterestIRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User Interest
 
IRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation SystemsIRJET- An Intuitive Sky-High View of Recommendation Systems
IRJET- An Intuitive Sky-High View of Recommendation Systems
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
typicality-based collaborative filtering recommendation
typicality-based collaborative filtering recommendationtypicality-based collaborative filtering recommendation
typicality-based collaborative filtering recommendation
 
SIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDY
SIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDYSIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDY
SIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDY
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
 
ENTERTAINMENT CONTENT RECOMMENDATION SYSTEM USING MACHINE LEARNING
ENTERTAINMENT CONTENT RECOMMENDATION SYSTEM USING MACHINE LEARNINGENTERTAINMENT CONTENT RECOMMENDATION SYSTEM USING MACHINE LEARNING
ENTERTAINMENT CONTENT RECOMMENDATION SYSTEM USING MACHINE LEARNING
 
IRJET- Book Recommendation System using Item Based Collaborative Filtering
IRJET- Book Recommendation System using Item Based Collaborative FilteringIRJET- Book Recommendation System using Item Based Collaborative Filtering
IRJET- Book Recommendation System using Item Based Collaborative Filtering
 
An Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
An Adaptive Framework for Enhancing Recommendation Using Hybrid TechniqueAn Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
An Adaptive Framework for Enhancing Recommendation Using Hybrid Technique
 
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...
 
Recommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association RulesRecommendation based on Clustering and Association Rules
Recommendation based on Clustering and Association Rules
 

Recently uploaded

Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 

Recently uploaded (20)

Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 

Major

  • 1. SUBMITTED BY:-KARAN GOYAL 9911103474 F-3 Shilling Attacks on Recommender Systems
  • 2. Introduction  One area of research which has recently gained importance is the security of Recommender Systems. Recommender Systems are widely used to help deal with the problem of information overload, by making personalized recommendations for information, products and services during a live interaction.  In recent years, Automated Collaborative Filtering (ACF) has been successfully employed in them in order to help users deal with the number of options available to them, by making high quality recommendations.  Recommender Systems are not beneficial only to the consumers of the product but also to the retail companies that produce those products, since recommendations of their products will in turn result in increased sales and customer satisfaction.
  • 3. Existing Problems  However, the open nature of these systems make them vulnerable to Shilling attacks in which malicious users may influence the system by inserting biased data into the system, in order to push the prediction of some targeted items.  Unscrupulous producers attack such systems to have their products recommended more often than those of their competitors.  They hire agents called shills that manipulate the system by giving false opinion about the target products and mislead the consumers.  Such attacks may lead to erosion of user’s trust in the objectivity and accuracy of the system.
  • 4. An attack against a collaborative filtering recommender system consists of a set of attack profiles, each containing biased rating data associated with a fictitious user identity, and including a target item to be promoted or demoted. Profile injection attacks can be categorized based on the knowledge required by the attacker to mount the attack, the intent of a particular attack, and the size of the attack. From the perspective of the attacker, the best A second dimension of an attack is the intent of an attacker.Two simple intents are push and nuke. An attacker may insert profiles to make a product more likely (push) or less likely (nuke) to be recommended.  Push Attack Models: Two basic Push attack models are the random and average attack models. Both of these attack models involve the generation of attack profiles using randomly assigned ratings to the filler items in the profile. In the random attack the assigned ratings are based on the overall distribution of user ratings in the database, while in the average attack the rating for each filler item is computed based on its average rating for all users.  Nuke Attack Models: Random and average attack models can also be used for nuking a target item. This can be accomplished by associating minimum-rating with the target item instead of maximum-rating, as in push attack models. However, attack models that are effective for pushing items are not necessarily effective for nuke attacks. Another possible aim of an attacker might be simple vandalism—to make the entire system functions poorly. Our work here assumes a more focused economic motivation on the part of the attacker, namely, that there is something to be gained by promoting or demoting a particular product.We are concerned primarily with the “win” for the attacker: the change in the predicted rating of the attacked item.
  • 5. Proposed Solution  This paper focuses on the algorithms being used in recommender systems, effectiveness of the shilling attacks on recommender systems and detect ability of these attacks  Recommender Systems are a powerful new technology for extracting additional value for a business from its user databases. Some conclusions have been drawn that prevent shilling attacks on the systems.
  • 6. They Are:-  Prefer item-item: Results show that item-based techniques hold the promise of allowing collaborative-based algorithms to scale to large datasets and at the same time produce high-quality recommendations. The shilling attacks are more effective in the case of item-item algorithms than user-user.  Use recommendation metrics: The paper proposed and investigated the use of statistical metrics for detecting the patterns of shilling attacks in a recommender system. MovieLens database has been evaluated by these metrics and it is shown that the attackers do indeed exhibit special, noticeable patterns.
  • 7.  Watch Metrics but worry anyway The lower the MAE, the more accurately the recommendations engine predicts user ratings. Although MAE is a standard for evaluating the effectiveness of the ACF algorithms, it is not of much use to the end users since it generally gives the users a predicted rating of an item whereas the users prefer system based recommendations.  Protect new items: Attacks that target recommendation frequency of low-information items (i.e. ones with few ratings) are more effective than attacks against high-information items. Thus, new items tend to get attacked more easily. It is in an attacker's best interest to restrict the effect of an attack to a small target set of items in order to be more subtle and try to avoid detection by the system operators.
  • 8. Implementation details and issues ACF ALGORITHMSUSED Collaborative filtering (CF) is the process of filtering for information or patterns using techniques involving collaboration among multiple agents, viewpoints, data sources, etc. It’s a method of making automatic predictions (filtering) about the interests of a user by collecting taste information from many users (collaborating). Applications of collaborative filtering typically involve very large data sets. Collaborative filtering methods have been applied to many different kinds of data including sensing and monitoring data - such as in mineral exploration, environmental sensing over large areas or multiple sensors. The underlying assumption of CF approach is that those who agreed in the past tend to agree again in the future. Collaborative filtering has the advantage that such interactions can be scaled to groups of thousands or even millions. The paper largely focuses on personalized recommender systems. In particular ones that use automated collaborative filtering (ACF), which refers to algorithms that generate recommendations on the basis that people who have expressed similar opinions in the past are likely to share opinions in the future. These algorithms produce recommendations based on the intuition that similar users have similar tastes. That is, people who you share common likes and dislikes with are likely to be a good source for recommendations.
  • 9. K-NN USER-USER  K-NNUSER-USER This algorithm belongs to the memory-based class of CF algorithms.The standard collaborative filtering algorithm is based on user-to-user similarity. Predictions under this algorithm are computed as a two step process. First, the similarities between the target user and all other users who have rated the target item are computed — most commonly using the Pearson correlation coefficient.Then the prediction for the target item is computed using at most k closest users found from step one, and by applying a weighted average of deviations from the selected users’ means.  The user-user algorithm uses the following formula to compute a predicted rating p for a user u on an item i.Here, ru is user u's average rating over all rated items, wu,v is the mean-adjusted Pearson correlation (similarity) between users u and v, and Uu,i is user u's neighbourhood with respect to item I and consists of the k users who have rated i and have the greatest Pearson correlation with u. k is a tuneable parameter and represents the number of neighbours.
  • 10.  K-NN ITEM-ITEM This algorithm is also an instance of a memory-based approach. Predictions are computed by first computing item-item similarities.Once the item-item similarities are computed, the rating space of the target user is examined to find all the rated items similar to the target item.The weighted average is then performed that generates the prediction.Typically, a threshold of k similar items are used rather than all.The formula used to compute a prediction in item-item is: Where J is the set of k similar items, ru,j is the prediction for the user on item j, and simI,j is the similarity between items i and j.
  • 11. HYPOTHESES  HYPOTHESIS 1: Different ACF algorithms respond differently to shilling attacks.  HYPOTHESIS 2: Shilling attacks affect recommender algorithms differently from prediction algorithms.  HYPOTHESIS 3: Shilling attacks are not detectable using traditional measures of algorithm performance.  HYPOTHESIS 4 : Ratings distribution of the target item influences attack effectiveness.
  • 12. METHODS A total of twenty-four experiments were performed in a 2x2x2x3 design.The algorithm (user-user or item- item), attack type (AverageBot or RandomBot), attack intent (nuke or push), and number of new users/bots (25, 50, or 100) were varied in each experiment.The target set for the experiments consists of 22 items.This set was selected to include a variety of different movie types including future releases, new releases, obscure films, popular films, controversial films, and long- standing favorites. In terms of ratings properties, this selection of items represents a wide range of popularity (number of ratings), entropy (a measure of the variance of ratings), and likability (mean rating).Table 1 displays the properties of items in the target set.
  • 13. METRICS Recommender systems research has used several types of measures for evaluating the quality of a recommender system: Mean Absolute Error (MAE) between ratings and predictions is a widely used metric. MAE is a measure of the deviation of recommendations from their true user-specified values. For each ratings-predictions pair <pi , qi > this metrics treats the absolute error between them i.e. |pi - qi | equally.The MAE is computed by first summing these absolute errors of the N corresponding ratings-predictions pairs and then computing the average. Formally,The lower the MAE, the more accurately the recommendations engine predicts user ratings..  TOP- N RECOMMENDATION ACCURACY Studies have shown that when given a recommendation list, the users prefer to browse only the first few items of the list.This phenomenon can be shown through the following two graphs.These figures show the browse depth of 137991 MovieLens recommendation searches.  Stability of Prediction (SOP):This particular model of robustness measures the power of a recommender system to deliver stable predictions to users in the presence of an arbitrary amount of inaccurate data in a system. As such, this model is independent of the “true” ratings for the items over which SOP is calculated.  Power of Attack (POA) is defined as the average change in prediction toward some target value over all target users and items. It gives a positive value when the direction of prediction shift is towards the target.  Expected Top N Occupancy (exptopn): This metric helps to identify in determining the expected number of times an item would occur in a top N recommendation list. For example:The target items are E and F. the top 5 recommendation list is shown in the following table
  • 14. CONCLUSION Recommender Systems are a powerful new technology for extracting additional value for a business from its user databases. Some conclusions have been drawn that prevent shilling attacks on the systems.  Prefer item-item: Results show that item-based techniques hold the promise of allowing collaborative-based algorithms to scale to large datasets and at the same time produce high-quality recommendations.The shilling attacks are more effective in the case of item-item algorithms than user-user.  Use recommendation metrics:This paper proposed and investigated the use of statistical metrics for detecting the patterns of shilling attacks in a recommender system. MovieLens database has been evaluated by these metrics and it is shown that the attackers do indeed exhibit special, noticeable patterns.  Watch Metrics but worry anyway:There has been considerable research in the area of recommender systems evaluation. Some of these concepts can also be applied to the evaluation of the security of recommender systems, but in evaluating security, topic of interest is not the raw performance, but rather the change in performance induced by an attack. A strong prediction shift is not a guarantee that an item will be recommended— it is possible that other items’ scores are affected by an attack as well or that the item scores so low to begin with that even a significant shift does not promote it to recommended status. The lower the MAE, the more accurately the recommendations engine predicts user ratings.Although MAE is a standard for evaluating the effectiveness of the ACF algorithms, it is not of much use to the end users since it generally gives the users a predicted rating of an item whereas the users prefer system based recommendations.
  • 15.  Protect new items:Attacks that target recommendation frequency of low-information items (i.e. ones with few ratings) are more effective than attacks against high-information items.Thus, new items tend to get attacked more easily. It is in an attacker's best interest to restrict the effect of an attack to a small target set of items in order to be more subtle and try to avoid detection by the system operators.  Rest of the paper talks of intrinsic properties of shilling attacks (i.e. Dimensions of attacks).Along the intent dimension, an attacker may insert profiles to make a product more likely (push) or less likely (nuke) to be recommended. Along the target dimension, Shill attacks can be directed at a particular subset of users or a subset of items in a recommender system. Along the required knowledge dimension, it is observed that the attacks that target recommendation frequency of low-information items are more effective than attacks against high- information items. Along the cost dimension, there are two primary components: knowledge cost and execution cost. Along the dimension of algorithm dependence, Item-based collaborative filtering might provide significant robustness compared to the user-based algorithm.Along the detectability dimension, a considerable complication in detecting shilling attacks is that it is difficult to precisely and completely define the set of shilling attack patterns.