290 likes | 471 Views
DISTRIBUTED COLLABORATIVE FILTERING FOR ROBUST RECOMMENDATION AGAINST SHILLING ATTACKS AE-TTIE JI 1 , CHEOL YEON 1 , HEUNG-NAM KIM 1 , AND GEUN-SIK JO 2. 1 Intelligent E-Commerce Systems Laboratory, Department of Computer Science & Information Engineering, Inha University
E N D
DISTRIBUTED COLLABORATIVE FILTERING FOR ROBUST RECOMMENDATION AGAINST SHILLING ATTACKSAE-TTIE JI1, CHEOL YEON1, HEUNG-NAM KIM1, AND GEUN-SIK JO2 1 Intelligent E-Commerce Systems Laboratory, Department of Computer Science & Information Engineering, Inha University {aerry13, entireboy, nami}@eslab.inha.ac.kr 2 School of Computer Science & Engineering, Inha University, 253 Yonghyun-dong, Incheon, Korea 402-751 gsjo@inha.ac.kr
INTRODUCTION & BACKGROUNDS • A Robustness Analysis of Collaborative Filtering • Userprofiles made by anonymous unauthenticated users Vulnerability to Profile Injection Attacks • PocketLens - Distributed Personal Recommender It can partially improve the effects of PIA from system providers. • Trust in Recommender Systems • But, it is still not safe from anonymous attackers! • “Trust” in Recommender systems • Automated attack detection schemes and robustness of recommendation algorithms. • Correlation between trust and user similarity
TCFMA ARCHITECTURETRUST-BASED COLLABORATIVE FILTERING WITH MOBILE AGENTS • Credibility of recommendations • To achieve robustness against shilling attacks Distributed Personal Recommender Web of Trust • Trust Propagation • To overcome sparseness of webs of trust The Advogato trust metric • Scalability • To raisethe efficiency of distributed computing Mobile Agent Framework
Architecture Fig. 1. Overview of trust-based collaborative filtering with mobile agents
THE MEANING OF NOTATIONS Table 1. The meaning of notations
TRUST-BASED USER SELECTION • AGENTPo finds the migration path {PATHPo} that includes users trusted by PO for a mobile agent AGENTMPo. • The neighbors of target user PO are chosen from the users included in {PATHPo}. • PO’s personal agent AGENTPo creates a mobile agent, AGENTMPo, to find neighbors and build a similarity model based on them incrementally. • AGENTMPo traces the path recursively until no users exist in {PATHPo}∩{TRUSTPc}. • AGENTMPo is disposed of from the last node after visiting all users in {PATHPo}.
Trust-based User Selection • The Advogato maximum flow algorithm • Discover which users are trusted by credible members of an online community and which are not. • The bottleneck property • “the total trust quantity accorded to an s → t edge is not significantly affected by changes to the successors of t” • The minimum number of profiles that make the attack succeed is not included in the process of collaborative filtering.
Incremental Model Building • AGENTMPO identifies IOi and IPj that are {ITEMSPO}∩{ITEMSPC} and {ITEMSPC} - {ITEMSPO} respectively, by communicating with a neighbor agent AGENTPC. • For each pair (IOi, IPj), AGENTMPO calculates values and sends the values to its own user agent AGENTPO. (cosine and adjusted cosine similarity)
Incremental Model Building • AGENTPO adds up these values incrementally until AGENTMPO sends values of all users in {PATHPO} except for those which don’t have IOi. • AGENTPO calculates the similarity of item pair (IOi, IPj).
AGENTS’ TASKS IN EACH CASE Fig. 2. Agents’ tasks in each case
RECOMMENDATIONS & FEEDBACK • Predictions • Feedback Fig. 3. Recommendations and propagation user’s feedback
DATASETS & EVALUATION METRICS • Datasets • Crawling through epinions.com in May 2006 • http://www.epinions.com • Numeric rating of item is in the range of 1 to 5 • Web of Trust among users • Users who had rated at least 5 item • Users who had expressed trust opinion to at least 25 users • Items that had been rated by at least 10 users Table 1. Dataset for Experiment
DATASETS & EVALUATION METRICS • Evaluation Metrics • Mean absolute error (MAE) • Absolute Prediction Shift (APS)
Performance Evaluation • Prototype system implemented using IBM aglet Software with JDK 1.4.2 • Benchmark system to compare the performance • Random model building (in PocketLens) • Miller, B., Konstan, J., Terveen, L., Riedl, J.: PocketLens: Towards a Personal Recommender System. In ACM Transactions on Information Systems 22 (2004) 437-476
Performance Evaluation • Overall Performance of Prediction Quality • TCFMA + cosine-based scheme showed better prediction quality than the other two methods. • Even a small number of users can result in a relatively better model with our proposed methods Table 2. Overall Performance of Prediction Quality
PerformanceEvaluation • Positive Effect of Trust for Prediction • Datasets with users who have more than x trusted users. • The more trust opinions are included in each user, the better the prediction quality obtained. • Direct trust opinions have a positive influence on prediction quality. Table 3. Sensitivity of trust on MAE (neighbor peer size = 50)
Performance evaluation • Robustness of the shilling problem • The set of manipulated users including arbitrary 50 ratings were inserted into the training dataset. Fig. 4. Comparison of robustness on manipulated users
Performance evaluation • Efficiency of similarity model building • The time required for model building • The number of neighbors required for model building • The proposed method is far superior with respect to the effectiveness of similarity model building. Table 4. Comparison of required time and accessed users (neighbor user size = 50)
Conclusion • We proposed a novel TCFMA architecture to solve the problems that can occur in online CF recommender systems related to an improper use of personal information and a profile injection attack. • We obtained very good robustness from malicious attackswithout any degradation of prediction quality, compared to general peer-to-peer CF recommender systems. • We also achieved efficient distributed computing for building item-item similarity models by adding useful functionalities of mobile agents.
FUTURE WORK • Trust Decay • The trust relationship becomes weaker as it forwards to its successors. • It is essential to take this phenomenon into consideration for applying trust propagation algorithms to real-world applications. • Attack Detection • Automated attack detection algorithms based on diverse types of attack models can lead to more robust recommendation algorithms.
Trust Graph Conversion - Advogato Advogato graph transform functiontransform ( G = (V, E, CV)) { set E′ 0, V′ 0; for all x ∈ V do add node x+ to V′ ; add node x- to V′ ; if CV (x) >= 1 then add edge (x-, x+) to E′; set CE′ (x-, x+) CV (x) -1; for alledge (x, y) ∈ E do add edge (x+, y-) to E′; set CE′ (x+, y-) ∞; end do add edge (x, supersink) to E′; set CE′ (x-, supersink) 1; end if end do return G′ =(V′, E′, CE′ ); }
Trust Propagation & Finding Migration Path Ford-fulkerson maxflow algorithm functionmaxflow (G′, seed, supersink) { for eachedge (x, y) ∈ E′ in G′ do F (x, y) 0; F (y, x) 0; end do while there exists a path P from seed to supersink in the residual Network G′Fdo CF(P) min {CF (x, y) : (x, y) in P}; for eachedge (x, y) in P do F (x, y) F (x, y) + CF (P); F (y, x) -F (x, y) end do end while }
4*3+3*1+1*2+4*3 32+12+22+32 42+32+12+42 0.9134 Examples Mi: Model owner’s items Ni: Neighbor’s items Ni Mi Ni Mi
4*3+3*1+1*2+4*3+3*1 32+12+22+32+12 42+32+12+42+32 0.9146 Examples Ni Mi Ni Mi Mi: Model owner’s items Ni: Neighbor’s items
4*3+3*1+1*2+4*3+3*1+1*5 32+12+22+32+12+52 42+32+12+42+32+12 0.7329 Examples Ni Mi Ni Mi