SlideShare a Scribd company logo
1 of 20
Profile Injection Attack Detection
in Recommender System
Supervisor:
Dr. Deepak Garg
Associate Professor & Head
Thapar University
Presented By:
Ashish Kumar
801331004
ME-SE
Recommender System (RS) is a system used to
serve the right product to the user based on either
his previous interests or by using his correlation
with other users [1].
Types:
1. Content Based RS (uses feature/ keywords).
2. Collaborative RS (uses relationship between
users & items).
3. Hybrid RS (uses both content & collaborative
based RS).
Recommender System: Introduction
Recommended Items:
Profile Injection Attacks – why???
SellerAttacker
5
1. Target item (𝑖 𝑡)
2. Selected items (𝑖 𝑠)
3. Filler item (𝑖 𝐹)
4. Unrated item set (𝑖∅)
Attack Profile Structure
Figure 1: General structure of attack profile.
1. PUSH Attacks: to promote an item. Types [2]:
i. Random Attacks: no ratings to 𝑖 𝑠, average rating of
the system to 𝑖 𝐹 and maximum rating to 𝑖 𝑡.
ii. Average Attacks: no ratings to 𝑖 𝑠, average rating of
the item belonging to 𝑖 𝐹 and maximum rating to 𝑖 𝑡.
iii. Bandwagon Attack: maximum ratings to the item
belonging to 𝑖 𝑠, 𝑖 𝑡 and average rating of the system to
𝑖 𝐹.
iv. Segment Attack: maximum rating to 𝑖 𝑠, minimum to
𝑖 𝐹 and maximum rating to 𝑖 𝑡.
cont…
Types of Attacks
2. NUKE Attack: to demote an item. Types:
i. Love-Hate Attack: 𝑖 𝑠 is not used,
maximum rating to 𝑖 𝐹 and minimum
rating to 𝑖 𝑡.
ii. Reverse Bandwagon Attack: minimum
rating to 𝑖 𝑠 and𝑖 𝑡, average rating of system
is given to 𝑖 𝐹.
1. Measure the robustness of the system: we
measure the effect of attack profiles on our system.
After attack their will be some change in the
predictions, this change in prediction tells about the
robustness and power of attack. More prediction
shift indicates large effect on the system.
2. Detection of attacks: to detect the attacks, we use
generic and model specific attributes.
Problem Statement
Steps:
1. Measure the efficiency (Prediction shift) of
attack.
2. Calculate the attack detection attributes
(generic and model specific attributes).
3. Compare the accuracy of statistical models.
4. Pick the top three performing models.
5. Ensemble the models (resulting models from
step 4) using voting approach.
Proposed Approach
Measuring the effectiveness of attacks
Figure 2: Prediction shift versus attack size for random, average and bandwagon attacks.
Figure 3: Prediction shift versus attack size for reverse bandwagon and Love-Hate attacks.
1. Generic Attributes: common for all attacks [3].
i. Rating deviation from mean agreement (RDMA): finds
profile’s average deviation per item, weighted by number of ratings
for that item. 𝑅𝐷𝑀𝐴 𝑢 =
𝑖=0
𝑁 𝑢
𝑟 𝑢,𝑖−𝑟 𝑖
ti
𝑁 𝑢
where 𝑁 𝑢 is the number of items rated by user 𝑢, 𝑟𝑢,𝑖 is rating
given by user 𝑢 to item 𝑖. ti is the number of ratings provided for
item 𝑖. 𝑟𝑖 is average of these ratings
ii. Weighted Deviation from Mean Agreement (WDMA):
identify the anomalies that place a high weight on rating deviations
for sparse items. 𝑊𝐷𝑀𝐴 𝑢 =
𝑖=0
𝑁 𝑢
𝑟 𝑢,𝑖−𝑟 𝑖
ti
2
𝑁 𝑢
iii. Degree of Similarity with Top Neighbors (DegSim): finds
the average similarity of a profile’s top 𝑘 nearest neighbors.
𝐷𝑒𝑔𝑆𝑖𝑚 𝑢 = 𝑣=1
𝑘 𝑠𝑖𝑚 𝑢,𝑣
𝑘
cont…
Attack Detection Attributes
iv. Length Variance (LengthVar): find the variance in
the length of a given profile from the average
length in the database.
𝐿𝑒𝑛𝑔𝑡ℎ𝑉𝑎𝑟𝑢 =
𝑙 𝑢 − 𝑙
𝑘∈𝑈(𝑙 𝑘 − 𝑙)2
2. Model Specific Attributes:
i. Mean Variance (MeanVar): used for average and
random attacks. 𝑀𝑒𝑎𝑛𝑉𝑎𝑟 𝑝 𝑡,𝑢 =
𝑖∈(𝑃 𝑢−𝑃 𝑡)(𝑟 𝑖,𝑢− 𝑟 𝑖)2
𝑃 𝑢
ii. Filler Mean Target Difference (FMTD): used for
bandwagon and reverse bandwagon attacks.
𝐹𝑀𝑇𝐷 𝑢 =
𝑖∈𝑃 𝑢,𝑇
𝑟 𝑢,𝑖
𝑃 𝑢,𝑇
−
𝑘∈𝑃 𝑢,𝐹
𝑟 𝑢,𝑘
𝑃 𝑢,𝐹
We use two evaluation metrics [4]:
1. Precision: only real attacker.
𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 =
#𝑡𝑟𝑢𝑒 𝑝𝑜𝑖𝑡𝑖𝑣𝑒
#𝑡𝑟𝑢𝑒 𝑝𝑜𝑖𝑡𝑖𝑣𝑒 + #𝑓𝑎𝑙𝑠𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒
2. Recall: all attackers.
𝑟𝑒𝑐𝑎𝑙𝑙 =
#𝑡𝑟𝑢𝑒 𝑝𝑜𝑖𝑡𝑖𝑣𝑒
#𝑡𝑟𝑢𝑒 𝑝𝑜𝑖𝑡𝑖𝑣𝑒 + #𝑓𝑎𝑙𝑠𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒
Evaluation Metrics
Attack Size 1% 3% 6% 9% 12% 15%
Models P R P R P R P R P R P R
Decision
Tree
.822 .811 .844 .830 .859 .848 .868 .855 .889 .872 .901 .928
Random
Forest
.880 .872 .894 .897 .905 .912 .909 .902 .929 .917 .957 .922
Ada Boost .819 .802 .829 .810 .834 .828 .858 .840 .883 .868 .902 .915
SVM .901 .902 .912 .928 .928 .908 .937 .911 .972 .959 .99 .984
Linear
Regression
.862 .842 .872 .882 .882 .908 .908 .919 .918 .935 .939 .941
Neural
Network
.892 .901 .919 .911 .922 .929 .959 .958 .961 .969 .97 .964
Ensemble .891 .892 .908 .912 .918 .916 .935 .924 .954 .948 .972 .957
Ensemble approach for profile classification
Table 1: Performance analysis for 10% average attacks.
Filler Size 1% 10% 20% 30% 40% 50%
Models P R P R P R P R P R P R
Decision
Tree
.90 .892 .921 .93 .928 .919 .939 .912 .94 .94 .961 .968
Random
Forest
.929 .930 .939 .92 .948 .948 .952 .956 .962 .961 .973 .979
Ada Boost .9 .908 .914 .918 .93 .924 .935 .938 .948 .934 .950 .943
SVM .938 .927 .949 .94 .959 .959 .971 .975 .979 .981 .988 .989
Linear
Regression
.89 .862 .89 .907 .918 .91 .925 .918 .929 .902 .93 .931
Neural
Network
.949 .938 .95 .943 .951 .954 .959 .958 .968 .967 .979 .98
Ensemble .939 .932 .946 .934 .953 .953 .961 .963 .968 .969 .98 .982
Table 2: Performance analysis for average attacks at 5% filler size.
Clustering Approach for Attack Detection
Figure 4: Performance analysis for 10% average attack.
Figure 5: Performance analysis for average attacks at 5% filler size.
1. We focused on several keys in the area of attacks
against recommender system i.e. different types of
attacks, attack detection attributes and model
evaluation metrics.
2. We give two approach for the attack detection; 1st is
ensambling (supervised) approach and 2nd is
clustering (unsupervised) approach.
3. We found that accuracy of supervised approach is
better than unsupervised.
4. We found that love-hate attack not only require least
knowledge but it is more effective than reverse
bandwagon for demoting an item.
5. We also found that average attack perform better that
other attacks of the same category.
Conclusion
1. Proposed system can be used for email
classification i.e. spam or non spam.
2. This system can be applied for the detection
of DOS attacks.
3. Same approach can be applied for the
intrusion detection.
4. More research can be done for the detection
of more attributes as more the attributes
better will be the accuracy.
Future Scope
2015:
[1]. Kumar Ashish, Garg Deepak, and Rana Prashant. “Ensemble
approach to detect profile injection attack in recommender
system,” Fourth International Conference on Advances in
Computing, Communications and Informatics (ICACCI-2015), IEEE,
August 10-13, 2015, Kochi. [Accepted]
[2]. Kumar Ashish, Garg Deepak, and Rana Prashant “Clustering
approach to detect profile injection attack in recommender
system,” PCITC-2015, IEEE, October 15-17, 2015, Bhubaneshwar.
[Accepted]
2014:
[3]. Kumar, Ashish. "Software Architecture Styles: A Survey."
International Journal of Computer Applications 87(9), 2014.
List of Publication
[1]. Davoodi, Fatemeh Ghiyafeh, and Omid Fatemi. "Tag based
recommender system for social bookmarking sites." In Advances
in Social Networks Analysis and Mining (ASONAM), 2012
IEEE/ACM International Conference on, pp. 934-940. IEEE, 2012.
[2]. Lam, Shyong K., and John Riedl. "Shilling recommender systems
for fun and profit." In Proceedings of the 13th international
conference on World Wide Web, pp. 393-402. ACM, 2004.
[3]. Mobasher, Bamshad, Robin Burke, Runa Bhaumik, and Chad
Williams. "Toward trustworthy recommender systems: An
analysis of attack models and algorithm robustness." ACM
Transactions on Internet Technology (TOIT) 7, no. 4 (2007): 23.
[4]. O'Mahony, Michael, Neil Hurley, Nicholas Kushmerick, and
Guénolé Silvestre. "Collaborative recommendation: A robustness
analysis." ACM Transactions on Internet Technology (TOIT) 4, no. 4
(2004): 344-377.
References
You tube video link
https://www.youtube.com/watch?v=7FsrMneUZl4&feature=youtu.be

More Related Content

Similar to Profile Injection Attack Detection in Recommender System

Early_detection_of_the_advanced_persistent_threat_.pdf
Early_detection_of_the_advanced_persistent_threat_.pdfEarly_detection_of_the_advanced_persistent_threat_.pdf
Early_detection_of_the_advanced_persistent_threat_.pdf
Pratham411148
 
Core Insight Enterprise 5min
Core Insight Enterprise 5minCore Insight Enterprise 5min
Core Insight Enterprise 5min
Nsolera
 
Paper id 24201456
Paper id 24201456Paper id 24201456
Paper id 24201456
IJRAT
 
Running Head 2Week #8 MidTerm Assignment .docx
Running Head    2Week #8 MidTerm Assignment               .docxRunning Head    2Week #8 MidTerm Assignment               .docx
Running Head 2Week #8 MidTerm Assignment .docx
healdkathaleen
 

Similar to Profile Injection Attack Detection in Recommender System (20)

Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
security evaluation of pattern classifiers under attack
security evaluation of pattern classifiers under attacksecurity evaluation of pattern classifiers under attack
security evaluation of pattern classifiers under attack
 
Spam email filtering
Spam email filteringSpam email filtering
Spam email filtering
 
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
 
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
 
Presentation_Malware Analysis.pptx
Presentation_Malware Analysis.pptxPresentation_Malware Analysis.pptx
Presentation_Malware Analysis.pptx
 
Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...
Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...
Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...
 
Early_detection_of_the_advanced_persistent_threat_.pdf
Early_detection_of_the_advanced_persistent_threat_.pdfEarly_detection_of_the_advanced_persistent_threat_.pdf
Early_detection_of_the_advanced_persistent_threat_.pdf
 
SensePost Threat Modelling
SensePost Threat ModellingSensePost Threat Modelling
SensePost Threat Modelling
 
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionMulti Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
 
Core Insight Enterprise 5min
Core Insight Enterprise 5minCore Insight Enterprise 5min
Core Insight Enterprise 5min
 
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
 
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
SPS'20 - Designing a Methodological Framework for the Empirical Evaluation of...
 
Paper id 24201456
Paper id 24201456Paper id 24201456
Paper id 24201456
 
Running Head 2Week #8 MidTerm Assignment .docx
Running Head    2Week #8 MidTerm Assignment               .docxRunning Head    2Week #8 MidTerm Assignment               .docx
Running Head 2Week #8 MidTerm Assignment .docx
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approach
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
 

Profile Injection Attack Detection in Recommender System

  • 1. Profile Injection Attack Detection in Recommender System Supervisor: Dr. Deepak Garg Associate Professor & Head Thapar University Presented By: Ashish Kumar 801331004 ME-SE
  • 2. Recommender System (RS) is a system used to serve the right product to the user based on either his previous interests or by using his correlation with other users [1]. Types: 1. Content Based RS (uses feature/ keywords). 2. Collaborative RS (uses relationship between users & items). 3. Hybrid RS (uses both content & collaborative based RS). Recommender System: Introduction
  • 3. Recommended Items: Profile Injection Attacks – why??? SellerAttacker 5
  • 4. 1. Target item (𝑖 𝑡) 2. Selected items (𝑖 𝑠) 3. Filler item (𝑖 𝐹) 4. Unrated item set (𝑖∅) Attack Profile Structure Figure 1: General structure of attack profile.
  • 5. 1. PUSH Attacks: to promote an item. Types [2]: i. Random Attacks: no ratings to 𝑖 𝑠, average rating of the system to 𝑖 𝐹 and maximum rating to 𝑖 𝑡. ii. Average Attacks: no ratings to 𝑖 𝑠, average rating of the item belonging to 𝑖 𝐹 and maximum rating to 𝑖 𝑡. iii. Bandwagon Attack: maximum ratings to the item belonging to 𝑖 𝑠, 𝑖 𝑡 and average rating of the system to 𝑖 𝐹. iv. Segment Attack: maximum rating to 𝑖 𝑠, minimum to 𝑖 𝐹 and maximum rating to 𝑖 𝑡. cont… Types of Attacks
  • 6. 2. NUKE Attack: to demote an item. Types: i. Love-Hate Attack: 𝑖 𝑠 is not used, maximum rating to 𝑖 𝐹 and minimum rating to 𝑖 𝑡. ii. Reverse Bandwagon Attack: minimum rating to 𝑖 𝑠 and𝑖 𝑡, average rating of system is given to 𝑖 𝐹.
  • 7. 1. Measure the robustness of the system: we measure the effect of attack profiles on our system. After attack their will be some change in the predictions, this change in prediction tells about the robustness and power of attack. More prediction shift indicates large effect on the system. 2. Detection of attacks: to detect the attacks, we use generic and model specific attributes. Problem Statement
  • 8. Steps: 1. Measure the efficiency (Prediction shift) of attack. 2. Calculate the attack detection attributes (generic and model specific attributes). 3. Compare the accuracy of statistical models. 4. Pick the top three performing models. 5. Ensemble the models (resulting models from step 4) using voting approach. Proposed Approach
  • 9. Measuring the effectiveness of attacks Figure 2: Prediction shift versus attack size for random, average and bandwagon attacks. Figure 3: Prediction shift versus attack size for reverse bandwagon and Love-Hate attacks.
  • 10. 1. Generic Attributes: common for all attacks [3]. i. Rating deviation from mean agreement (RDMA): finds profile’s average deviation per item, weighted by number of ratings for that item. 𝑅𝐷𝑀𝐴 𝑢 = 𝑖=0 𝑁 𝑢 𝑟 𝑢,𝑖−𝑟 𝑖 ti 𝑁 𝑢 where 𝑁 𝑢 is the number of items rated by user 𝑢, 𝑟𝑢,𝑖 is rating given by user 𝑢 to item 𝑖. ti is the number of ratings provided for item 𝑖. 𝑟𝑖 is average of these ratings ii. Weighted Deviation from Mean Agreement (WDMA): identify the anomalies that place a high weight on rating deviations for sparse items. 𝑊𝐷𝑀𝐴 𝑢 = 𝑖=0 𝑁 𝑢 𝑟 𝑢,𝑖−𝑟 𝑖 ti 2 𝑁 𝑢 iii. Degree of Similarity with Top Neighbors (DegSim): finds the average similarity of a profile’s top 𝑘 nearest neighbors. 𝐷𝑒𝑔𝑆𝑖𝑚 𝑢 = 𝑣=1 𝑘 𝑠𝑖𝑚 𝑢,𝑣 𝑘 cont… Attack Detection Attributes
  • 11. iv. Length Variance (LengthVar): find the variance in the length of a given profile from the average length in the database. 𝐿𝑒𝑛𝑔𝑡ℎ𝑉𝑎𝑟𝑢 = 𝑙 𝑢 − 𝑙 𝑘∈𝑈(𝑙 𝑘 − 𝑙)2 2. Model Specific Attributes: i. Mean Variance (MeanVar): used for average and random attacks. 𝑀𝑒𝑎𝑛𝑉𝑎𝑟 𝑝 𝑡,𝑢 = 𝑖∈(𝑃 𝑢−𝑃 𝑡)(𝑟 𝑖,𝑢− 𝑟 𝑖)2 𝑃 𝑢 ii. Filler Mean Target Difference (FMTD): used for bandwagon and reverse bandwagon attacks. 𝐹𝑀𝑇𝐷 𝑢 = 𝑖∈𝑃 𝑢,𝑇 𝑟 𝑢,𝑖 𝑃 𝑢,𝑇 − 𝑘∈𝑃 𝑢,𝐹 𝑟 𝑢,𝑘 𝑃 𝑢,𝐹
  • 12. We use two evaluation metrics [4]: 1. Precision: only real attacker. 𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 = #𝑡𝑟𝑢𝑒 𝑝𝑜𝑖𝑡𝑖𝑣𝑒 #𝑡𝑟𝑢𝑒 𝑝𝑜𝑖𝑡𝑖𝑣𝑒 + #𝑓𝑎𝑙𝑠𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒 2. Recall: all attackers. 𝑟𝑒𝑐𝑎𝑙𝑙 = #𝑡𝑟𝑢𝑒 𝑝𝑜𝑖𝑡𝑖𝑣𝑒 #𝑡𝑟𝑢𝑒 𝑝𝑜𝑖𝑡𝑖𝑣𝑒 + #𝑓𝑎𝑙𝑠𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒 Evaluation Metrics
  • 13. Attack Size 1% 3% 6% 9% 12% 15% Models P R P R P R P R P R P R Decision Tree .822 .811 .844 .830 .859 .848 .868 .855 .889 .872 .901 .928 Random Forest .880 .872 .894 .897 .905 .912 .909 .902 .929 .917 .957 .922 Ada Boost .819 .802 .829 .810 .834 .828 .858 .840 .883 .868 .902 .915 SVM .901 .902 .912 .928 .928 .908 .937 .911 .972 .959 .99 .984 Linear Regression .862 .842 .872 .882 .882 .908 .908 .919 .918 .935 .939 .941 Neural Network .892 .901 .919 .911 .922 .929 .959 .958 .961 .969 .97 .964 Ensemble .891 .892 .908 .912 .918 .916 .935 .924 .954 .948 .972 .957 Ensemble approach for profile classification Table 1: Performance analysis for 10% average attacks. Filler Size 1% 10% 20% 30% 40% 50% Models P R P R P R P R P R P R Decision Tree .90 .892 .921 .93 .928 .919 .939 .912 .94 .94 .961 .968 Random Forest .929 .930 .939 .92 .948 .948 .952 .956 .962 .961 .973 .979 Ada Boost .9 .908 .914 .918 .93 .924 .935 .938 .948 .934 .950 .943 SVM .938 .927 .949 .94 .959 .959 .971 .975 .979 .981 .988 .989 Linear Regression .89 .862 .89 .907 .918 .91 .925 .918 .929 .902 .93 .931 Neural Network .949 .938 .95 .943 .951 .954 .959 .958 .968 .967 .979 .98 Ensemble .939 .932 .946 .934 .953 .953 .961 .963 .968 .969 .98 .982 Table 2: Performance analysis for average attacks at 5% filler size.
  • 14. Clustering Approach for Attack Detection Figure 4: Performance analysis for 10% average attack. Figure 5: Performance analysis for average attacks at 5% filler size.
  • 15. 1. We focused on several keys in the area of attacks against recommender system i.e. different types of attacks, attack detection attributes and model evaluation metrics. 2. We give two approach for the attack detection; 1st is ensambling (supervised) approach and 2nd is clustering (unsupervised) approach. 3. We found that accuracy of supervised approach is better than unsupervised. 4. We found that love-hate attack not only require least knowledge but it is more effective than reverse bandwagon for demoting an item. 5. We also found that average attack perform better that other attacks of the same category. Conclusion
  • 16. 1. Proposed system can be used for email classification i.e. spam or non spam. 2. This system can be applied for the detection of DOS attacks. 3. Same approach can be applied for the intrusion detection. 4. More research can be done for the detection of more attributes as more the attributes better will be the accuracy. Future Scope
  • 17. 2015: [1]. Kumar Ashish, Garg Deepak, and Rana Prashant. “Ensemble approach to detect profile injection attack in recommender system,” Fourth International Conference on Advances in Computing, Communications and Informatics (ICACCI-2015), IEEE, August 10-13, 2015, Kochi. [Accepted] [2]. Kumar Ashish, Garg Deepak, and Rana Prashant “Clustering approach to detect profile injection attack in recommender system,” PCITC-2015, IEEE, October 15-17, 2015, Bhubaneshwar. [Accepted] 2014: [3]. Kumar, Ashish. "Software Architecture Styles: A Survey." International Journal of Computer Applications 87(9), 2014. List of Publication
  • 18.
  • 19. [1]. Davoodi, Fatemeh Ghiyafeh, and Omid Fatemi. "Tag based recommender system for social bookmarking sites." In Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on, pp. 934-940. IEEE, 2012. [2]. Lam, Shyong K., and John Riedl. "Shilling recommender systems for fun and profit." In Proceedings of the 13th international conference on World Wide Web, pp. 393-402. ACM, 2004. [3]. Mobasher, Bamshad, Robin Burke, Runa Bhaumik, and Chad Williams. "Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness." ACM Transactions on Internet Technology (TOIT) 7, no. 4 (2007): 23. [4]. O'Mahony, Michael, Neil Hurley, Nicholas Kushmerick, and Guénolé Silvestre. "Collaborative recommendation: A robustness analysis." ACM Transactions on Internet Technology (TOIT) 4, no. 4 (2004): 344-377. References
  • 20. You tube video link https://www.youtube.com/watch?v=7FsrMneUZl4&feature=youtu.be