Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Semi-supervised learning-based recommendation system shilling attack detection method

A semi-supervised learning and attack detection technology, which is applied in the field of information security and can solve the problems of large errors, inability to determine the identity, and no use of the attack detection method.

Inactive Publication Date: 2011-09-14
NANJING UNIV OF FINANCE & ECONOMICS
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the actual recommendation system, there are often a large number of users whose identities cannot be determined (called unlabeled data), while only a small number of users can be identified (called labeled data), such as users with extremely high or low praise rates on Taobao, It is easy to determine the identity of Huangguan users, etc., but it is difficult to determine the identity of a large number of moderately favorable users
Due to the very small amount of labeled data, the error of the detection method based on supervised learning is relatively large
On the other hand, unsupervised learning does not use the existing labeled data set, and ignores the influence of the labeled data set on the unlabeled data set. The results of training are often difficult to have strong generalization learning ability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semi-supervised learning-based recommendation system shilling attack detection method
  • Semi-supervised learning-based recommendation system shilling attack detection method
  • Semi-supervised learning-based recommendation system shilling attack detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] A semi-supervised learning based recommendation system attack detection method of the present invention comprises the following stages:

[0059] 1) The preprocessing stage of troll attack detection; in this stage, the troll attack detection indicators of the marked and unmarked datasets are obtained by preprocessing the data of the marked data set and the unmarked data set, and then the initial naive attack detection index is trained on the marked data set Bayesian classifier;

[0060] If the category of the user is known, it belongs to the labeled data set L, otherwise it belongs to the unlabeled data set U; L={(u1,c1),(u2,c2),...,(u|L|,c|L| )} is a labeled data set, (u1, u2,,..., u|L|) represents a user set, (c1, c2,,..., c|L|) represents a type set of the user, and U={u' 1, u'2,..., u'|U|} are unlabeled data sets;

[0061] 2) EM-λ algorithm stage; in this stage, a stable classifier is continuously iteratively obtained through the EM-λ algorithm, and finally the typ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a semi-supervised learning-based recommendation system shilling attack detection method. The method comprises the following stages: a shilling attack detection preprocessing stage, namely preprocessing the data of a marked data set and an unmarked data set to obtain shilling attack detection indexes of the marked and unmarked data sets, and training an initial Naive Bayes classifier on the marked data set; and an EM-lambda algorithm stage, namely continuously iterating by an EM-lambda algorithm to obtain a stable classifier and finally obtaining the type of the unmarked data set, and predicting whether an unmarked user belongs to a normal user (N) or a shilling user (S) through a function f: U to C so as to finish the recommendation system shilling attack detection. The method is used for discovering shilling attack users in a recommendation system, has high efficiency, sensitivity, special effect performance, high detection rate and low error rate.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a semi-supervised learning-based recommendation system trolling attack detection method. Background technique [0002] The rapid growth of the scale and coverage of the Internet has brought about information overload. We live in the data age. According to IDC estimates, the total amount of data will reach 1.8ZB (1ZB=1,000,000PB) in 2011. Users are helpless in the face of massive data, and it is difficult to find useful information from it. Information. The recommender system is an important means of information filtering and a very potential method to solve the problem of information overload. The recommendation algorithm is the core part of the entire recommendation system. Collaborative filtering is the most widely used recommendation algorithm. In daily life, we often use the recommendations of good friends to make some choices. Collaborative filtering is based on this ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F17/30G06F21/55
Inventor 伍之昂曹杰王有权毛波
Owner NANJING UNIV OF FINANCE & ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products