Abstract
A recommender system is susceptible to manipulation through the injection of carefully crafted profiles. Some recent profile identification methods only perform well in specific attack scenarios. A general attack detection method is usually complicated or requires label samples. Such methods are prone to overtraining easily, and the process of annotation incurs high expenses. This study proposes an unsupervised divide-and-conquer method aiming to identify attack profiles, utilizing a specifically designed model for each kind of shilling attack. Initially, our method categorizes the profile set into two attack types, namely Standard and Obfuscated Behavior Attacks. Subsequently, profiles are separated into clusters within the extracted feature space based on the identified attack type. The selection of attack profiles is then determined through target item analysis within the suspected cluster. Notably, our method offers the advantage of requiring no prior knowledge or annotation. Furthermore, the precision is heightened as the identification method is designed to a specific attack type, employing a less complicated model. The outstanding performance of our model, validated through experimental results on MovieLens-100K and Netflix under various attack settings, demonstrates superior accuracy and reduced running time compared to current detection methods in identifying Standard and Obfuscated Behavior Attacks.
Introduction
In the era of big data, a recommender system has emerged as an effective tool for alleviating information overload by proactively providing potential products and services of interest to users [1]. Despite achieving remarkable performance across various applications [2, 3, 4], recommender systems remain vulnerable to adversarial attacks, a concern due to their openness, anonymity, and interactivity [5]. The shilling attack, also known as profile injection attack, is one of well-known attacks to recommender system, aiming to manipulate the frequency of recommendations for target items [6] by injecting well crafted profiles into the system. Numerous studies [7] indicate that even a small amount of attacked profiles can successfully mislead recommender systems.
Shilling attack detection, as a countermeasure, identifies suspected profiles based on various characteristics such as rating values [5, 8, 9, 10, 11], rating patterns [12, 13, 14, 15] and rating time [10, 16, 31]. Although supervised learning-based methods identify attack profiles successfully, their efficacy heavily relies on the knowledge of attack strategy. The performance drops significantly when an attack is different from the ones in the training set in inference [8, 9]. Moreover, the collection of attack profiles incurs substantial costs [17]. Some studies indicate that unsupervised detection methods, which cluster profiles according to their characteristic without using labels, demonstrate generalizability to unknown attacks in certain applications [18]. However, these methods usually assume that the prior knowledge of the attack, for example, the number of attack profiles [19] and candidate attack users [20], can be obtained in advance. This assumption may not be realistic in some applications. In addition, the unsupervised detection methods may exhibit poor performance in detection when the attack size or filler size is small [16].
This study mainly focuses on standard and obfuscated behavior attacks, recognized as the most prevalent shilling attack types encompassing a wide array of existing attack methods [18, 20, 21]. In standard behavior attacks, rated items are randomly selected, while popular items are deliberately chosen for rating in obfuscated behavior attacks to better simulate the rating behaviors of genuine profiles. An unsupervised attack profile identification method without any prior knowledge is proposed. Acknowledging the distinct characteristics of standard and obfuscated behavior attacks, a divide-and-conquer strategy is employed to address them separately. Given a set of user profiles, the potential attacks are classified as either standard or obfuscated behavior attacks according to their item popularity. Principal Component Analysis (PCA) [19] and Mean Popularity of a User (MPU) [22] are extracted for standard behavior attacks, while Weighted Deviation from Mean Agreement (WDMA) [9] is extracted for obfuscated behavior attacks. Afterwards, a clustering method based on the extracted feature is applied to determine suspicious profiles. Finally, target items are analyzed to identify attack profiles. The advantages of our methods include high efficiency, strong interpretability, and easy implementation. Our proposed method is then evaluated and compared against state-of-the-art (SOTA) methods, including Pop-SAD [22], SpDetector [23] and PCA-VarSelect [19], using two popular recommender system datasets, i.e., MovieLens-100K1 and Netflix.2 Experimental results affirm that our proposed method outperforms all others in terms of prior knowledge, accuracy, and running time when identifying profiles contaminated by standard and obfuscated behavior attacks with different attack and filler sizes.
The contributions of the study are shown as follows:
A divide-and-conquer approach is proposed to address the detection of standard and obfuscated behavior attacks separately. By individually considering the characteristics of each attack type, the detection performance in terms of accuracy and complexity can be enhanced. The obvious attack profiles are initially preliminarily filtered to approximate the distribution of genuine profiles in our model. The approximated distribution serves as a reference to enhance the precision of attack profile detection. Experimental results confirm the outstanding performance of our proposed identification method across seven common attack models under different settings on two benchmark datasets, i.e., MovieLens-100K and Netflix, when compared to Pop-SAD, SpDetector and PCA-VarSelect methods.
The rest of the paper is organized as follows. A brief introduction of related work is provided in Section 2, and a detailed description of the proposed method is represented in Section 3. The experimental results are presented and discussed in Section 4. Finally, the conclusions and future works are presented in Section 5.
Related work
In this section, shilling attack models adopted in this paper are introduced in section 2.1, and a brief review of the shilling attack detection methods is provided in section 2.2.
Shilling attack model
Shilling attacks are classified by their objectives into three categories: availability attacks, push attacks, and nuke attacks [20, 24, 25]. Availability attack aims to disfunction a recommender system, whereas push and nuke attacks aim to increase and decrease the recommendation frequency of target items respectively.
Shilling attacks are further distinguished based on the level of knowledge required for their execution, categorizing them into low knowledge attacks and high knowledge attacks [21, 25, 26, 27]. Practically, only limited knowledge of a target system can be obtained by an attacker. The attack with low knowledge usually consider [7, 20, 21, 25] selected (
The attack performance is improved by acquiring extensive knowledge about the target recommender system, e.g., the item popularity and item correlation [26, 27]. In addition, Generative Adversarial Network (GAN) trained by a number of real user profiles is also used to generate attack profiles [29, 30]. This kind of attack may not be realistic in some applications, as obtaining detailed information about recommender systems may pose a challenge. Consequently, this study specifically addresses attacks with low prior knowledge.
Shilling attack detection
Attack profiles are separated from genuine profiles by shilling attack detection according to the rating behavior or item distribution of the profiles [5, 10, 11]. A number of features are proposed to quantify characteristics of a profile, for example, Rating Deviation from Mean Agreement (RDMA) [8], Weighted Deviation from Mean Agreement (WDMA) [9], Weighted Degree of Agreement (WDA) [9] and Degree of Similarity with Top Neighbors (DegSim) [9]. Some features [12, 13, 14] related to item popularity are extracted to capture the difference between item distributions of normal and attack profiles. Additionally, certain features, e.g., expanded RDMA [16] and WDMA [31], incorporate temporal information of a profile to quantify the dynamic rating changes.
A number of supervised learning methods, e.g., the Neural Network [23, 32, 21], Support Vector Machine [31, 33], AdaBoost [11], k-Nearest Neighbourhood [16], Decision Tree [13, 14] and ensemble methods [13], with different kinds of features are used to identify attack profiles. Generally a supervised learning method is able to capture the difference between attack and normal profiles accurately. However, its discrimination ability usually cannot be generalized well to unseen attacks [8, 9]. Moreover, labeling profiles is costly and timely [17, 34]. On the other hand, no label is required by unsupervised detection methods which analyze the characteristics of different groups of profiles [5, 18, 19, 20, 35, 36]. For example, the high correlation of attack profiles [19, 35], highly relevant of target item rating sequence [20], long-term correlation and stable preference [18], correlation of user rated items in the time dimension [5], rating distribution of attack users [36]. A few studies focus on semi-supervised detection methods [37, 38]. A classifier is first trained on the labeled data, and then is updated by considering additional unlabeled data iteratively in these methods. For example, the probability of unlabeled data is estimated by a Naïve Bayes model trained by using labeled data and updates the model iteratively [38]. However, this kind of methods may performs badly due to uncertain information, especially for a small amount of labeled data [23].
Proposed method
The divide-and-conquer approach is helpful in detecting attacks for several reasons. Firstly, the selection of filler items varies across different attack models, with random or popular items being chosen. This distinction allows the divide-and-conquer approach to effectively detect attacks based on the specific selection of filler items. Additionally, current detection techniques often rely on investigating shared traits among different attack models, resulting in complex and computationally demanding models. In contrast, the divide-and-conquer approach simplifies the process by extracting unique characteristics for each attack type, eliminating the need for complex models. This approach prevents the issue of characteristics becoming noisy or irrelevant when applied to different attack models. Moreover, by focusing on specific characteristics for each attack type, the divide-and-conquer approach avoids overfitting and enhances the interpretability of the detection models. Consequently, our study devises a divide-and-conquer method, which is an unsupervised detection method without any prior knowledge. The framework of the proposed method is illustrated in Fig. 1. The entire process can be separated into three phases, including attack type classification, suspected profile identification and attack profile refinement. The rating behaviors of obfuscated behavior attacks are much more similar as the genuine users. In the first phase (Section 3.1), our method categorizes the attack model as either standard or obfuscated behavior attacks based on the way of selecting rated items, item popularity distribution and mean popularity of each user. Two features, namely Estimated Mean Popularity of a User (
The framework of our proposed shilling attack detection method containing three phases including attack type classification, suspected profile identification and attack profile identification.
Given a rating matrix
where
where
The differences of the MPU distributions of contaminated and benign profiles are illustrated in Fig. 2. The dataset MovieLens-100K1 and Netflix2 are chosen as an example. The range [
MPU distributions of movielens-100k and netflix with different attack models. The x-axis represents a MPU value while the y-axis indicates its frequency. The significant difference between the attack and clean profile sets are highlight by a red box.
When there is no attack, it can be observed that MPU for genuine profiles follows the normal distribution [22], as illustrated in the initial graph in first column of Fig. 2. The x-axis represents MPU values while the y-axis indicates their frequency. For standard behavior attacks, where rated items are randomly selected, MPU values for the attack profiles tend to be smaller than genuine profiles. As a result, a small crest can be found in the histogram when MPU values are low. Conversely, obfuscated behavior attacks predominantly rate popular items to simulate the rating behavior of genuine users. In the case of the AoP attack, which randomly selects popular items, the MPU distribution essentially follows a normal distribution. However, for the Power Item Attack (PIA), where the most popular items are rated, a sharp increase can be observed when the MPU value is large. The change of the distribution caused by obfuscated behavior attacks is less obvious than that resulting from standard behavior attacks. According to Eq. (3), a red box is assigned when the relative difference between the output and a normal distribution, denoted as
By observing that the low rating items of the MPU distribution for profiles contaminated by standard behavior attack deviate from the Gaussian distribution, the given rating matrix (
where
The interval
Our model identifies suspected profiles through clustering in feature spaces specially designed for Standard and Obfuscated Behavior Attacks separately. The feature extraction method is thoroughly discussed for each type of attack.
Identification on profiles with standard behavior attack
Given that genuine users usually rate items according to their preferences, the popularity of items tends to follow a long tail distribution [22]. This characteristic may differ in Standard Behavior Attack where items are randomly rated in attack profiles [22]. As discussed in the previous section, MPU can be employed to distinguish attack and genuine profiles. However, the method only can determine whether a dataset is contaminated by Standard Behavior Attack, and cannot precisely identify the attack profiles due to absence of real user behavior.
Our model estimates the genuine MPU distribution by employing PCA-VarSelect [19] to filter out the obvious attack profiles. PCA-VarSelect is chosen for its excellent detection performance when the number of attack profiles is known. As the contaminated samples are usually less than 50% of the collected profiles [11] in reality, we select the top 50% unlikely attack profiles, contained in
The profiles are subsequently divided into two distinct clusters using the OPTICS clustering algorithm [39] in the space of
The concept of the proposed feature extraction is exemplified using MovieLens-100K1. We simulate a shilling attack on MovieLens-100K through average attack with 5% attack size and 5% filler size. The resulting MPU distribution is depicted in Fig. 3a, where red and blue indicate attack and clean profiles respectively. After removing uncertain profiles using PCA-VarSelect, the updated MPU distribution is shown in Fig. 3b. The distribution of
The MPU distributions of the profiles in different situations.
The WDMA distribution of the profiles under different situations. The x-axis represents a WDMA value (
In obfuscated behavior attacks, popular items are rated, making the attacks highly similar to genuine profiles. Our method detects obfuscated behavior attacks according to Weighted Deviation from Mean Agreement (WDMA) [9], which measures the average deviation degree of rating value, defined as follows:
where
Similar to the rationale for Standard Behavior Attack identification, the top 50% evidently clean samples are used to approximate the real clean profiles. The 50% of samples with smallest WDMA values are excluded, and the remaining samples are used to calculate
MovieLens-100K is utilized as an example to illustrate the proposed feature extraction for Obfuscated Behavior Attack. AoP attack with 5% attack size and 5% filler size is injected to the dataset, and its WDMA distribution is shown in Fig. 4a, where red and blue indicate attack and clean profiles. Attack profiles exhibit small WDMA values and mix with the clean profiles. Figure 4b displays the distribution of WDMA after removing uncertain profiles, and Fig. 4c illustrates the distribution of
To enhance the accuracy of attack profile identification, all suspected profiles are filtered according to the target items of the attack. As the attack aims to manipulate the recommendation frequency on the target item, the standard deviation of target items on attack profiles should be small. The precision of attack detection is heightened by analyzing the standard deviation of an item in suspected profiles identified in the previous phase. Assuming the rated value to be between 1 to 5, the suspicion of the
where
The item(s) with the maximum rating suspicion score will be identified as the target items. Subsequently, push and nuke attack are identified according to the rating values of the suspected target items, i.e., if the values are high, it is the push attack; otherwise, it is a nuke attack. A profile in the suspected cluster that rates a high (low) value in the suspected target items of the push (nuke) attack is regarded as the attack profile.
In this section, experiments are carried out to evaluate and compare the performance of the proposed method with State-of-the-Art (SOTA) methods.
Experimental settings
Two real datasets, MovieLens-100K1 and Netflix2, are used in the experiments. MoivesLens-100K consists of 100,000 ratings from 943 users on 1,682 movies, with all users providing ratings for at least 20 movies. Netflix includes 103,297,638 ratings on 17,770 movies by 480,189 users. For our experiment, a subset of the dataset is randomly selected, containing 280,015 ratings on 4,000 movies from 2,000 users. In both datasets, each movie is rated as 1 to 5, where 5 indicate the user likes the movie the most and 1 indicate the least. Ten independent runs are carried out to obtain more credible results.
All user profiles in the datasets are assumed as genuine profile. Shilling attack profiles are generated by the attack models, including Random Attack [25, 21], Average Attack [25, 21], Bandwagon Attack [25], Target Shift Attack [28], Noise Injection Attack [28], AoP Attack [25, 21], and Power Item Attack (PIA) [21]. The target items are randomly selected from the items whose average rating number is less than four to generate multi-target items attacks. Only one kind of attack is injected in each experiment. For each attack, three target items are chosen. The attack size is set as 3%, 5%, 10%, and 15%, and the filler size is set as 3%, 5%, and 10%. Filler items in AoP attacks are randomly selected from the top 30% of the popular items.
Three SOTA methods are considered in our experiment. One unsupervised detection method, PCA-VarSelect [19], and two supervised detection methods, namely Pop-SAD [22] and SpDetector [23], are compared with our proposed method. The popularity distribution is conducted solely in Pop-SAD, while our proposed method considers the popularity distribution and also the average deviation degree of rating value. SpDetector is more complex as it requires the construction of user and item hypergraphs and the extraction of spectral features from these hypergraphs. Since the performance of PCA-VarSelect is highly relied on the attack size, we assume this prior information is known by PCA-VarSelect but not by our method, Pop-SAD, and SpDetector. On the other hand, we assume Pop-SAD and SpDetector obtain the attack type and its samples. To be more specific, 80% of the dataset is selected as the training set for Pop-SAD and SpDetector, which is not provided to our method and PCA-VarSelect. Consequently, our method requires the least prior knowledge. F-measure is calculated to quantify the performance.
Parameter settings
Experiments are conducted to investigate the impact of hyper-parameters
To choose suitable hyperparameters, some rating matrixs with different attacks are generated. Each rating matrix is considered as a sample, and its features are constructed by
Accuracy in MovieLens-100k and Netflix with different hyper parameters in Algorithm 1.
The hyperparameters for Pop-SAD and SpDetector are solely determined by the number of intervals (
The experimental results between the proposed method and Pop-SAD, SpDetector and PCA-VarSelect under various attacks with 5% attack size and 5% filler size are presented in Tables 1 and 2. Despite our method requiring no prior knowledge of the attack and no label information, it still achieves the best detection accuracy and stability, i.e., the highest average and the lowest standard deviation of F-measure, among all the methods in standard behavior attacks. For obfuscated behavior attack PIA, the accuracy of our method (i.e., 99.0% and 99.5%) is insignificantly lower than 100% achieved by two supervised detection methods, Pop-SAD and SpDetector, for both datasets. The overall performance of SpDetector is close to our method. However, our method possesses the advantage of not necessitating any annotations during training. On the other hand, another unsupervised method, PCA-VarSelect, is less accurate than our method in detecting the standard behavior attack, even although PCA-VarSelect is also used in our method. These results explain that the approximation on the genuine users’ distribution by using 50% profiles of our method benefits the detection process. Obtaining more the prior knowledge of the attack is evidently helpful in detection. PCA-VarSelect only outperforms Pop-SAD in detecting the standard behavior attack in MovieLens-100k. In other cases, Pop-SAD performs much better than PCA-VarSelect. Netflix’s dataset is sparser compared to MovieLens, which impacts the effectiveness of certain attack detection methods. Specifically, AoP attacks target popular items, but due to the subtle difference in MPU values between legitimate and attack profiles within the Netflix dataset, using popularity distribution as a detection measure is less effective. Consequently, Pop-SAD shows diminished performance on the Netflix dataset. Conversely, with other standard behavior attacks where items are rated randomly, this increases the popularity of each item and the inherent sparsity of the dataset actually enhances the ability to detect attacks through popularity distribution analysis. As more complex hypergraph spectral features are extracted by SpDetector, it generally performs better than Pop-SAD and PCA-VarSelect.
F-measure (%) of the compared results in MovieLens-100k with 5% attack size and 5% filler size
F-measure (%) of the compared results in MovieLens-100k with 5% attack size and 5% filler size
F-measure (%) of the compared results in Netflix with 5% attack size and 5% filler size
The detection performance on attacks with different attack size and average filler size in terms of average F-measure of MovieLens-100k and Netflix is shown in Fig. 6. The results suggest that the performance of all detection method generally increases with the increase of attack sizes, aligning with many studies, as more information about the attack is provided. There is no doubt that the proposed method and SpDetector perform the best among all methods, i.e., their F-measures are almost equal to 100% in all scenarios. As our method does not require any label information, it is more efficient than SpDetector. PCA-VarSelect cannot effectively handle obfuscated behavior attacks since the rated items, mostly selected from popular items, are highly correlated to genuine profiles. The F-measure of PCA-VarSelect decreases when filler size increases, as the difference between genuine profiles and attack profiles is reduced. The performance of Pop-SAD improves with the increase of filler size and attack size, Pop-SAD is able to recognize the attacks effectively when the attack characteristics are obvious. Hence, Pop-SAD performs well in the identification of obfuscated behavior attacks, as the accumulated MPU probability for some intervals of obfuscated behavior attack profiles is noticeably larger than genuine profiles.
Average F-measure (%) in MovieLens-100k and Netflix with different attack and filler sizes.
Running time (s) of the detection method in MovieLens-100k and Netflix with different attack sizes
The running time (in seconds) of our method and others in MovieLens-100k and Netflix with different attack sizes is illustrated in Table 3. Due to the larger size of Netflix comparing to MovieLens-100k, all methods except Pop-SAD require a longer detection time. This is because the probability is calculated much faster due to the sparsity of Netflix. SpDetector uses dramatically longer time than the other methods due to its complicated feature extraction from a deep neural network. As a result, although the accuracy achieved by our method and SpDetector is similar, as shown in previous sections, the time complexity of our method is much lower than SpDetector. Moreover, the running time of our method is similar to PCA-VarSelect and much shorter than Pop-SAD.
Conclusion
In this paper, we propose an unsupervised divide-and-conquer approach for detecting shilling attacks. Our model, requiring no prior knowledge of the attacks, begins by classifying contaminated profiles into Standard or Obfuscated Behavior Attacks. These profiles are then clustered using the OPTICS algorithm based on
One possible future work is to address hybrid attack identification, detecting the amalgamation of suspect profiles within the same attack type but with different parameters. The challenge of identifying multiple attackers employing varying strategies will also be considered. Mixed-strategy attacks tend to obscure characteristic signatures, which may necessitate the use of data augmentation to reinforce these signatures and improve identification capabilities. Moreover, the issue of reduced characteristic clarity in such complex attack scenarios warrants further investigation, potentially leading to the development of more sophisticated detection methods.
Footnotes
Acknowledgments
This paper is supported by the Henan Provincial Science and Technology Research Project (No.222102210258) and Key Platform, Research Project of Education Department of Guangdong Province (No.2020KTSCX132).
