DISTRIBUTED COLLABORATIVE FILTERING FOR ROBUST RECOMMENDATION AGAINST SHILLING ATTACKS DISTRIBUTED COLLABORATIVE FILTERING FOR ROBUST RECOMMENDATION AGAINST.

Slides:



Advertisements
Similar presentations
Collaborative Tagging in Recommender Systems AE-TTIE JI1, CHEOL YEON1, HEUNG-NAM KIM1, AND GEUN-SIK JO2 1 Intelligent E-Commerce Systems Laboratory,
Advertisements

Recommender Systems & Collaborative Filtering
Mining User Similarity Based on Location History Yu Zheng, Quannan Li, Xing Xie Microsoft Research Asia.
RecMax – Can we combine the power of Social Networks and Recommender Systems? Amit Goyal and L. RecMax: Exploting Recommender Systems for Fun and Profit.
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
Agenda  Introduction  Charactarization of Attacks  Attack models  Effectivness analysis  Countermeasures  Privacy aspects  Discussion.
Item Based Collaborative Filtering Recommendation Algorithms
Collaborative QoS Prediction in Cloud Computing Department of Computer Science & Engineering The Chinese University of Hong Kong Hong Kong, China Rocky.
A P2P REcommender system based on Gossip Overlays (PREGO) ‏ R.Baraglia, P.Dazzi M.Mordacchini, L.Ricci A P2P REcommender system based on Gossip Overlays.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Active Learning and Collaborative Filtering
INHA UNIVERSITY INCHEON, KOREA Propagation Models for Trust and Distrust in Social Networks C. Ziegler, G. Lausen, Information.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
The Wisdom of the Few A Collaborative Filtering Approach Based on Expert Opinions from the Web Xavier Amatriain Telefonica Research Nuria Oliver Telefonica.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
TrustWalker: A Random Walk Model for Combining Trust-based and Item-based Recommendation Mohsen Jamali & Martin Ester Simon Fraser University, Vancouver,
1 Collaborative Filtering and Pagerank in a Network Qiang Yang HKUST Thanks: Sonny Chee.
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks Telecommunication and Security LAB. Dept. of Industrial.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Sparsity, Scalability and Distribution in Recommender Systems
Item-based Collaborative Filtering Recommendation Algorithms
Models of Influence in Online Social Networks
Performance of Recommender Algorithms on Top-N Recommendation Tasks
Towards Highly Reliable Enterprise Network Services via Inference of Multi-level Dependencies Paramvir Bahl, Ranveer Chandra, Albert Greenberg, Srikanth.
Liang Xiang, Quan Yuan, Shiwan Zhao, Li Chen, Xiatian Zhang, Qing Yang and Jimeng Sun Institute of Automation Chinese Academy of Sciences, IBM Research.
Quantification of the non- parametric continuous BBNs with expert judgment Iwona Jagielska Msc. Applied Mathematics.
Protecting Sensitive Labels in Social Network Data Anonymization.
Chengjie Sun,Lei Lin, Yuan Chen, Bingquan Liu Harbin Institute of Technology School of Computer Science and Technology 1 19/11/ :09 PM.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Exploiting Context Analysis for Combining Multiple Entity Resolution Systems -Ramu Bandaru Zhaoqi Chen Dmitri V.kalashnikov Sharad Mehrotra.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
The Effect of Dimensionality Reduction in Recommendation Systems
Zhuo Peng, Chaokun Wang, Lu Han, Jingchao Hao and Yiyuan Ba Proceedings of the Third International Conference on Emerging Databases, Incheon, Korea (August.
The new protocol of freenet Taken from Ian Clarke and Oskar Sandberg (The Freenet Project)
O PTIMAL SERVICE TASK PARTITION AND DISTRIBUTION IN GRID SYSTEM WITH STAR TOPOLOGY G REGORY L EVITIN, Y UAN -S HUN D AI Adviser: Frank, Yeong-Sung Lin.
1 Privacy-Enhanced Collaborative Filtering Privacy-Enhanced Personalization workshop July 25, 2005, Edinburgh, Scotland Shlomo Berkovsky 1, Yaniv Eytani.
WSP: A Network Coordinate based Web Service Positioning Framework for Response Time Prediction Jieming Zhu, Yu Kang, Zibin Zheng and Michael R. Lyu The.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
KNN CF: A Temporal Social Network kNN CF: A Temporal Social Network Neal Lathia, Stephen Hailes, Licia Capra University College London RecSys ’ 08 Advisor:
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
Recommender Systems with Social Regularization Hao Ma, Dengyong Zhou, Chao Liu Microsoft Research Michael R. Lyu The Chinese University of Hong Kong Irwin.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
Online Evolutionary Collaborative Filtering RECSYS 2010 Intelligent Database Systems Lab. School of Computer Science & Engineering Seoul National University.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Item-Based Collaborative Filtering Recommendation Algorithms Badrul Sarwar, George Karypis, Joseph Konstan, and John Riedl GroupLens Research Group/ Army.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Reputation-aware QoS Value Prediction of Web Services Weiwei Qiu, Zhejiang University Zibin Zheng, The Chinese University of HongKong Xinyu Wang, Zhejiang.
The Wisdom of the Few Xavier Amatrian, Neal Lathis, Josep M. Pujol SIGIR’09 Advisor: Jia Ling, Koh Speaker: Yu Cheng, Hsieh.
ItemBased Collaborative Filtering Recommendation Algorithms 1.
Hao Ma, Dengyong Zhou, Chao Liu Microsoft Research Michael R. Lyu
Trust-aware Recommender Systems
Experience Report: System Log Analysis for Anomaly Detection
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Authors: Jiang Xie, Ian F. Akyildiz
Uncovering the Mystery of Trust in An Online Social Network
WSRec: A Collaborative Filtering Based Web Service Recommender System
Giannis F. Marias, Vassileios Tsetsos,
E-Commerce Theories & Practices
Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation Qi Xie1, Shenglin Zhao2, Zibin Zheng3, Jieming Zhu2 and Michael.
Dieudo Mulamba November 2017
Location Recommendation — for Out-of-Town Users in Location-Based Social Network Yina Meng.
Network Flow 2016/04/12.
Jinhong Jung, Woojung Jin, Lee Sael, U Kang, ICDM ‘16
ITEM BASED COLLABORATIVE FILTERING RECOMMENDATION ALGORITHEMS
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
August 8, 2006 Danny Budik, Itamar Elhanany Machine Intelligence Lab
Presentation transcript:

DISTRIBUTED COLLABORATIVE FILTERING FOR ROBUST RECOMMENDATION AGAINST SHILLING ATTACKS DISTRIBUTED COLLABORATIVE FILTERING FOR ROBUST RECOMMENDATION AGAINST SHILLING ATTACKS AE-TTIE JI 1, CHEOL YEON 1, HEUNG-NAM KIM 1, AND GEUN- SIK JO 2 1 Intelligent E-Commerce Systems Laboratory, Department of Computer Science & Information Engineering, Inha University {aerry13, entireboy, 2 School of Computer Science & Engineering, Inha University, 253 Yonghyun-dong, Incheon, Korea

INTRODUCTION & BACKGROUNDS A Robustness Analysis of Collaborative Filtering User profiles made by anonymous unauthenticated users Vulnerability to Profile Injection Attacks PocketLens - Distributed Personal Recommender It can partially improve the effects of PIA from system providers. Trust in Recommender Systems But, it is still not safe from anonymous attackers! Trust in Recommender systems Automated attack detection schemes and robustness of recommendation algorithms. Correlation between trust and user similarity

TCFMA ARCHITECTURE TRUST-BASED COLLABORATIVE FILTERING WITH MOBILE AGENTS Credibility of recommendations To achieve robustness against shilling attacks Distributed Personal Recommender Web of Trust Trust Propagation To overcome sparseness of webs of trust The Advogato trust metric Scalability To raise the efficiency of distributed computing Mobile Agent Framework

A RCHITECTURE Fig. 1. Overview of trust-based collaborative filtering with mobile agents

THE MEANING OF NOTATIONS PXPX Arbitrary user included in web of trust POPO Target user, i.e. similarity model owner PCPC Current user who P O s mobile agent is visiting at the moment {TRUST Px }List of users who are trusted by P X {BLOCK Px }List of users who are distrusted by P X {ITEMS Px } List of pairs, i.e. items which P X already has expressed his or her own opinion and these preference ratings. {PATH Px }Migration path which P X s mobile agent migrates along AGENT Px Personal agent of P X AGENT M Px Mobile agent of P X Table 1. The meaning of notations

TRUST-BASED USER SELECTION I. AGENT Po finds the migration path {PATH Po } that includes users trusted by P O for a mobile agent AGENT M Po. II. The neighbors of target user P O are chosen from the users included in {PATH Po }. III. P O s personal agent AGENT Po creates a mobile agent, AGENT M Po, to find neighbors and build a similarity model based on them incrementally. IV. AGENT M Po traces the path recursively until no users exist in {PATH Po }{TRUST Pc }. V. AGENT M Po is disposed of from the last node after visiting all users in {PATH Po }.

T RUST - BASED U SER S ELECTION The Advogato maximum flow algorithm Discover which users are trusted by credible members of an online community and which are not. The bottleneck property the total trust quantity accorded to an s t edge is not significantly affected by changes to the successors of t The minimum number of profiles that make the attack succeed is not included in the process of collaborative filtering.

I NCREMENTAL M ODEL B UILDING I. AGENT M PO identifies IO i and IP j that are {ITEMS PO }{ITEMS PC } and {ITEMS PC } - {ITEMS PO } respectively, by communicating with a neighbor agent AGENT PC. II. For each pair (IO i, IP j ), AGENT M PO calculates values and sends the values to its own user agent AGENT PO. (cosine and adjusted cosine similarity)

I NCREMENTAL M ODEL B UILDING III. AGENT PO adds up these values incrementally until AGENT M PO sends values of all users in {PATH PO } except for those which dont have IO i. IV. AGENT PO calculates the similarity of item pair (IO i, IP j ).

AGENTS TASKS IN EACH CASE Fig. 2. Agents tasks in each case

RECOMMENDATIONS & FEEDBACK Predictions Feedback Fig. 3. Recommendations and propagation users feedback

DATASETS & EVALUATION METRICS Datasets Crawling through epinions.com in May Numeric rating of item is in the range of 1 to 5 Web of Trust among users Users who had rated at least 5 item Users who had expressed trust opinion to at least 25 users Items that had been rated by at least 10 users userstrustsitemsrating 4,751216,4902,955121,862 Table 1. Dataset for Experiment

DATASETS & EVALUATION METRICS Evaluation Metrics Mean absolute error (MAE) Absolute Prediction Shift (APS)

P ERFORMANCE E VALUATION Prototype system implemented using IBM aglet Software with JDK Benchmark system to compare the performance Random model building (in PocketLens ) - Miller, B., Konstan, J., Terveen, L., Riedl, J.: PocketLens: Towards a Personal Recommender System. In ACM Transactions on Information Systems 22 (2004)

P ERFORMANCE E VALUATION Overall Performance of Prediction Quality TCFMA + cosine-based scheme showed better prediction quality than the other two methods. Even a small number of users can result in a relatively better model with our proposed methods Table 2. Overall Performance of Prediction Quality Neighbor peer size Random TCFMA + cosine TCFMA + adjusted

P ERFORMANCE E VALUATION Positive Effect of Trust for Prediction Datasets with users who have more than x trusted users. The more trust opinions are included in each user, the better the prediction quality obtained. Direct trust opinions have a positive influence on prediction quality. Trust xTrust 5Trust 10Trust 15Trust 25Trust 45 TCFMA + cosine TCFMA + adjusted Table 3. Sensitivity of trust on MAE (neighbor peer size = 50)

P ERFORMANCE EVALUATION Robustness of the shilling problem The set of manipulated users including arbitrary 50 ratings were inserted into the training dataset. Fig. 4. Comparison of robustness on manipulated users

P ERFORMANCE EVALUATION Efficiency of similarity model building The time required for model building The number of neighbors required for model building The proposed method is far superior with respect to the effectiveness of similarity model building. Table 4. Comparison of required time and accessed users (neighbor user size = 50) Model OwnerUser 1User 2User 3User 4User 5Average TCFMA + cosine Time(ms) # User Random Time(ms) # User

C ONCLUSION We proposed a novel TCFMA architecture to solve the problems that can occur in online CF recommender systems related to an improper use of personal information and a profile injection attack. We obtained very good robustness from malicious attacks without any degradation of prediction quality, compared to general peer-to-peer CF recommender systems. We also achieved efficient distributed computing for building item-item similarity models by adding useful functionalities of mobile agents.

FUTURE WORK Trust Decay The trust relationship becomes weaker as it forwards to its successors. It is essential to take this phenomenon into consideration for applying trust propagation algorithms to real-world applications. Attack Detection Automated attack detection algorithms based on diverse types of attack models can lead to more robust recommendation algorithms.

!!!!THANKYOU!!!! !!!!THANK YOU!!!!

T RUST G RAPH C ONVERSION - A DVOGATO Advogato graph transform function transform ( G = (V, E, C V )) { set E 0, V 0; for all x V do add node x+ to V ; add node x- to V ; if C V (x) >= 1 then add edge (x-, x+) to E; set C E (x-, x+) C V (x) -1; for all edge (x, y) E do add edge (x+, y-) to E; set C E (x+, y-) ; end do add edge (x, supersink) to E; set C E (x-, supersink) 1; end if end do return G =(V, E, CE ); }

C APACITY ASSIGNMENT

C ONVERTED GRAPH

T RUST P ROPAGATION & F INDING M IGRATION P ATH Ford-fulkerson maxflow algorithm function maxflow (G, seed, supersink) { for each edge (x, y) E in G do F (x, y) 0; F (y, x) 0; end do while there exists a path P from seed to supersink in the residual Network G F do C F (P) min {C F (x, y) : (x, y) in P}; for each edge (x, y) in P do F (x, y) F (x, y) + C F (P); F (y, x) -F (x, y) end do end while }

E XAMPLES itemsratings A Matrix 3 AI 5 Space Odyssey 4 Dark City 4 itemsratings B Matrix 4 Star Wars 3 Dark City 4 Ghost Busters 5 itemsratings C Space Odyssey 3 Star Wars 1 Dark City 3 AI 4 Resident Evil 2 itemsratings D AI 4 Resident Evil 5 Minority Report 3 Star Wars 2 Dark City 1

E XAMPLES itemsratings A Matrix 3 AI 5 Model Owner Space Odyssey 4 Dark City 4 itemsratings B Neighbor Matrix 4 Star Wars 3 Dark City 4 Ghost Busters 5 Mi: Model owners items Ni: Neighbors items Star Wars Ghost Busters Resident Evil Matrix Dark City AI Mi Ni Star Wars Ghost Busters Resident Evil Matrix Dark City AI Mi Ni *3+3*1+1*2+4*3

itemsratings C Space Odyssey 3 NeighborStar Wars 1 Dark City 3 AI 4 Resident Evil 2 Mi: Model owners items Ni: Neighbors items Star Wars Ghost Busters Resident Evil Matrix Dark City AI Mi Ni itemsratings A Matrix 3 AI 5 Model Owner Space Odyssey 4 Dark City 4 Star Wars Ghost Busters Resident Evil Matrix Dark City Space Odyssey AI Mi Ni *3+3*1+1*2+4*3+3*1 E XAMPLES

Star Wars Ghost Busters Resident Evil Minority Report Matrix Dark City Space Odyssey AI itemsratings A Matrix 3 AI 5 Model Owner Space Odyssey 4 Dark City 4 itemsratings D AI 4 Neighbor Resident Evil 5 Minority Report 3 Star Wars 5 Dark City 1 Mi Ni Star Wars Ghost Busters Resident Evil Matrix Dark City Space Odyssey AI Mi Ni *3+3*1+1*2+4*3+3*1+1*5