IDEAS home Printed from https://ideas.repec.org/a/sae/intdis/v18y2022i3p15501329221082415.html
   My bibliography  Save this article

A security detection approach based on autonomy-oriented user sensor in social recommendation network

Author

Listed:
  • Shanshan Wan
  • Ying Liu

Abstract

User social network-based recommender system has achieved significant performance in current recommendation fields. However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. Most shilling attack detection approaches depend on the explicit user historical data to locate shilling attackers. Some important features such as information propagation and social feedback of users in social networks have not been noticed. We propose a security detection method based on autonomy-oriented user sensor (AOUSD) to identify shilling attackers. Specifically, (1) the user is simulated as a social sensor with autonomous capabilities, (2) the user interaction model is built based on information propagation, information feedback and information disappearance mechanisms of social sensors, and a user dynamic knowledge graph is formed by considering the variable time function, (3) hierarchical clustering method is used to generate preliminary suspicious candidate groups and graph community detection clustering method is applied on the dynamic knowledge graph to detect the attackers. Then, AOUSD is first simulated on NetLogo and it is compared with other algorithms based on the Amazon data. The results prove the advantages of AOUSD in the efficiency and accuracy on shilling attack detection.

Suggested Citation

  • Shanshan Wan & Ying Liu, 2022. "A security detection approach based on autonomy-oriented user sensor in social recommendation network," International Journal of Distributed Sensor Networks, , vol. 18(3), pages 15501329221, March.
  • Handle: RePEc:sae:intdis:v:18:y:2022:i:3:p:15501329221082415
    DOI: 10.1177/15501329221082415
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/15501329221082415
    Download Restriction: no

    File URL: https://libkey.io/10.1177/15501329221082415?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Yu, Junliang & Gao, Min & Rong, Wenge & Li, Wentao & Xiong, Qingyu & Wen, Junhao, 2017. "Hybrid attacks on model-based social recommender systems," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 483(C), pages 171-181.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Tauli-Corpuz, Vicky & Alcorn, Janis & Molnar, Augusta & Healy, Christina & Barrow, Edmund, 2020. "Cornered by PAs: Adopting rights-based approaches to enable cost-effective conservation and climate action," World Development, Elsevier, vol. 130(C).
    2. Jasem M. Alostad, 2019. "Improving the Shilling Attack Detection in Recommender Systems Using an SVM Gaussian Mixture Model," Journal of Information & Knowledge Management (JIKM), World Scientific Publishing Co. Pte. Ltd., vol. 18(01), pages 1-18, March.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:intdis:v:18:y:2022:i:3:p:15501329221082415. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.