Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey

dc.contributor.authorPalanisamy Sundar, Agnideven
dc.contributor.authorLi, Feng
dc.contributor.authorZou, Xukai
dc.contributor.authorGao, Tianchong
dc.contributor.authorRussomanno, Evan D.
dc.contributor.departmentComputer and Information Science, School of Scienceen_US
dc.date.accessioned2022-02-08T21:38:47Z
dc.date.available2022-02-08T21:38:47Z
dc.date.issued2020-09
dc.description.abstractThe internet is the home for huge volumes of useful data that is constantly being created making it difficult for users to find information relevant to them. Recommendation System is a special type of information filtering system adapted by online vendors to provide recommendations to their customers based on their requirements. Collaborative filtering is one of the most widely used recommendation systems; unfortunately, it is prone to shilling/profile injection attacks. Such attacks alter the recommendation process to promote or demote a particular product. Over the years, multiple attack models and detection techniques have been developed to mitigate the problem. This paper aims to be a comprehensive survey of the shilling attack models, detection attributes, and detection algorithms. Additionally, we unravel and classify the intrinsic traits of the injected profiles that are exploited by the detection algorithms, which has not been explored in previous works. We also briefly discuss recent works in the development of robust algorithms that alleviate the impact of shilling attacks, attacks on multi-criteria systems, and intrinsic feedback based collaborative filtering methods.en_US
dc.eprint.versionFinal published versionen_US
dc.identifier.citationSundar, A. P., Li, F., Zou, X., Gao, T., & Russomanno, E. D. (2020). Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey. IEEE Access, 8, 171703–171715. https://doi.org/10.1109/ACCESS.2020.3022962en_US
dc.identifier.urihttps://hdl.handle.net/1805/27728
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.isversionof10.1109/ACCESS.2020.3022962en_US
dc.relation.journalIEEE Accessen_US
dc.rightsPublisher Policyen_US
dc.rightsAttribution 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.sourcePublisheren_US
dc.subjectcollaborative filteringen_US
dc.subjectdetection traits and algorithmsen_US
dc.subjectprofile injection attacksen_US
dc.titleUnderstanding Shilling Attacks and Their Detection Traits: A Comprehensive Surveyen_US
dc.typeArticleen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Sundar2020Understanding-CCBY.pdf
Size:
1.37 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.99 KB
Format:
Item-specific license agreed upon to submission
Description: