Skip to main content

Evil Twins: Modeling Power Users in Attacks on Recommender Systems

  • Conference paper
User Modeling, Adaptation, and Personalization (UMAP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8538))

Abstract

Attacks on Collaborative Filtering Recommender Systems (RS) can bias recommendations, potentially causing users to distrust results and the overall system. Attackers constantly innovate, and understanding the implications of novel attack vectors on system robustness is important for designers and operators. Foundational research on attacks in RSs studied attack user profiles based on straightforward models such as random or average ratings data. We are studying a novel category of attack based explicitly on measures of influence, in particular the potential impact of high-influence power users. This paper describes our approach to generate synthetic attack profiles that emulate influence characteristics of real power users, and it studies the impact of attack vectors that use synthetic power user profiles. We evaluate both the quality of synthetic power user profiles and the effectiveness of the attack, on both user-based and matrix-factorization-based recommender systems. Results show that synthetic user profiles that model real power users are an effective way of attacking collaborative recommender systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. O’Mahony, M.P., Hurley, N., Silvestre, G.C.M.: Recommender systems: Attack types and strategies. In: Proceedings of the 20th National Conference on Artificial Intelligence, AAAI 2005 (2005)

    Google Scholar 

  2. Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: Proceedings of the 13th International Conference on World Wide Web. ACM (2004)

    Google Scholar 

  3. Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Technol. (2007)

    Google Scholar 

  4. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, New York (1994)

    Book  Google Scholar 

  5. Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of KDD 2001. ACM (2001)

    Google Scholar 

  6. Anand, S.S., Griffiths, N.: A market-based approach to address the new item problem. In: Proceedings of the ACM Recommender Systems Conference (2011)

    Google Scholar 

  7. Seminario, C.E., Wilson, D.C.: Assessing impacts of a power user attack on a matrix factorization collaborative recommender system. In: Proceedings of the 27th Florida Artificial Intelligence Research Society Conference (to appear, 2014)

    Google Scholar 

  8. Wilson, D.C., Seminario, C.E.: When power users attack: assessing impacts in collaborative recommender systems. In: Proceedings of the 7th ACM Conference on Recommender Systems, RecSys 2013. ACM (2013)

    Google Scholar 

  9. Desrosiers, C., Karypis, G.: A comprehensive survey of neighborhood-based recommendations methods. In: Ricci, F., Rokach, L., Shapira, B., Kantor, P.B. (eds.) Recommender Systems Handbook. Springer (2011)

    Google Scholar 

  10. Sarwar, B.M., Karypis, G., Konstan, J.A., Riedl, J.T.: Application of dimensionality reduction in recommender system – a case study. In: ACM WEBKDD Workshop (2000)

    Google Scholar 

  11. Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer (2009)

    Google Scholar 

  12. Amatriain, X., Jaimes, A., Oliver, N., Pujol, J.M.: Data mining methods for recommender systems. In: Ricci, F., et al. (eds.) Recommender Systems Handbook. Springer (2011)

    Google Scholar 

  13. Burke, R., O’Mahony, M.P., Hurley, N.J.: Robust collaborative recommendation. In: Ricci, F., et al. (eds.) Recommender Systems Handbook. Springer (2011)

    Google Scholar 

  14. Rashid, A., Karypis, G., Riedl, J.: Influence in ratings-based recommender systems: An algorithm-independent approach. In: Proceedings of the SIAM International Conference on Data Mining (2005)

    Google Scholar 

  15. Herlocker, J.L., Konstan, J.A., Terveen, L.G., Riedl, J.: Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems (2004)

    Google Scholar 

  16. Goyal, A., Lakshmanan, L.V.S.: Recmax: Exploiting recommender systems for fun and profit. In: Proceedings of KDD 2012 (2012)

    Google Scholar 

  17. Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of KDD 2003 (2003)

    Google Scholar 

  18. Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: Proc of the ACM SIGIR Conf. (1999)

    Google Scholar 

  19. Lathia, N., Hailes, S., Capra, L.: knn cf: A temporal social network. In: Proceedings of the 2nd ACM Recommender Systems Conference, RecSys 2008 (2008)

    Google Scholar 

  20. Seminario, C.E.: Accuracy and robustness impacts of power user attacks on collaborative recommender systems. In: Proceedings of the 7th ACM Conference on Recommender systems, RecSys 2013. ACM Press, New York (2013)

    Google Scholar 

  21. Shani, G., Gunawardana, A.: Evaluating recommendation systems. In: Ricci, F., et al. (eds.) Recommender Systems Handbook. Springer (2011)

    Google Scholar 

  22. Mehta, B., Nejdl, W.: Attack resistant collaborative filtering. In: SIGIR 2008: Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Wilson, D.C., Seminario, C.E. (2014). Evil Twins: Modeling Power Users in Attacks on Recommender Systems. In: Dimitrova, V., Kuflik, T., Chin, D., Ricci, F., Dolog, P., Houben, GJ. (eds) User Modeling, Adaptation, and Personalization. UMAP 2014. Lecture Notes in Computer Science, vol 8538. Springer, Cham. https://doi.org/10.1007/978-3-319-08786-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08786-3_20

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08785-6

  • Online ISBN: 978-3-319-08786-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics