Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey
dc.contributor.author | Palanisamy Sundar, Agnideven | |
dc.contributor.author | Li, Feng | |
dc.contributor.author | Zou, Xukai | |
dc.contributor.author | Gao, Tianchong | |
dc.contributor.author | Russomanno, Evan D. | |
dc.contributor.department | Computer and Information Science, School of Science | en_US |
dc.date.accessioned | 2022-02-08T21:38:47Z | |
dc.date.available | 2022-02-08T21:38:47Z | |
dc.date.issued | 2020-09 | |
dc.description.abstract | The internet is the home for huge volumes of useful data that is constantly being created making it difficult for users to find information relevant to them. Recommendation System is a special type of information filtering system adapted by online vendors to provide recommendations to their customers based on their requirements. Collaborative filtering is one of the most widely used recommendation systems; unfortunately, it is prone to shilling/profile injection attacks. Such attacks alter the recommendation process to promote or demote a particular product. Over the years, multiple attack models and detection techniques have been developed to mitigate the problem. This paper aims to be a comprehensive survey of the shilling attack models, detection attributes, and detection algorithms. Additionally, we unravel and classify the intrinsic traits of the injected profiles that are exploited by the detection algorithms, which has not been explored in previous works. We also briefly discuss recent works in the development of robust algorithms that alleviate the impact of shilling attacks, attacks on multi-criteria systems, and intrinsic feedback based collaborative filtering methods. | en_US |
dc.eprint.version | Final published version | en_US |
dc.identifier.citation | Sundar, A. P., Li, F., Zou, X., Gao, T., & Russomanno, E. D. (2020). Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey. IEEE Access, 8, 171703–171715. https://doi.org/10.1109/ACCESS.2020.3022962 | en_US |
dc.identifier.uri | https://hdl.handle.net/1805/27728 | |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isversionof | 10.1109/ACCESS.2020.3022962 | en_US |
dc.relation.journal | IEEE Access | en_US |
dc.rights | Publisher Policy | en_US |
dc.rights | Attribution 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | * |
dc.source | Publisher | en_US |
dc.subject | collaborative filtering | en_US |
dc.subject | detection traits and algorithms | en_US |
dc.subject | profile injection attacks | en_US |
dc.title | Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey | en_US |
dc.type | Article | en_US |