Recommendation system attack detection method based on time series data

A technology of recommendation system and attack detection, which is used in electrical digital data processing, special data processing applications, computing, etc.

Active Publication Date: 2014-03-26
INST OF AUTOMATION CHINESE ACAD OF SCI
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this kind of group attack behavior is widespread in practice, there are few works on how to detect group attack behavior, that is, to detect both the attacking user group and the target project group attacked by the attacking user group.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recommendation system attack detection method based on time series data
  • Recommendation system attack detection method based on time series data
  • Recommendation system attack detection method based on time series data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The detailed issues involved in the technical solution of the present invention are described in detail below. It should be pointed out that the described embodiments are intended to facilitate the understanding of the present invention, but do not limit it in any way.

[0019] figure 1 It shows the flowchart of the attack detection method for recommendation system based on time series data proposed by the present invention. Such as figure 1 As shown, the method includes the following steps:

[0020] Step S1 uses the user-item preference data set and frequent itemset mining technology to obtain candidate user groups and candidate item groups;

[0021] Step S2 is based on the user group and item group obtained in the first step, and calculates the "group preference degree value ratio" feature for each pair of user group and item group, which is used to describe the characteristics of the group attack behavior preference degree value;

[0022] Step S3 organizes all th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a recommendation system attack detection method based on time series data. The method includes the steps that a user-project preference degree data set and a frequent item set excavation technology are utilized to acquire user groups and project groups; group preference degree value proportional characteristics are calculated for the pairs of user sets and the pairs of project sets; all preference degrees of projects in the project groups form time series preference degree data according to operating time; group preference degree time interval characteristics are calculated for the pairs of user sets and the project sets; group average entropy characteristics are calculated for the user groups; for the user groups, maximum group preference degree value proportional characteristics corresponding to the user groups and maximum group preference degree time interval characteristics corresponding to the user groups are selected, and the user groups are sequentially ranked through the three characteristics, and then three ordered user group sequences are acquired; the three ordered user group sequences are integrated to acquire a wholly ordered user group sequence, and the most probably attack user groups are acquired; the most probably target project groups are acquired through the group preference degree value proportional characteristics.

Description

technical field [0001] The invention relates to the fields of machine learning and pattern recognition, in particular to the problem of attack detection of recommendation systems based on collaborative filtering in machine learning. Background technique [0002] In recent years, with the rapid development of the network, people are faced with a large amount of information every day. Faced with thousands of information, people are tired of finding the valuable information they are interested in. The emergence of recommendation system can free people from the massive information. The recommendation system is an information filtering technology, which can filter out valuable content that users are interested in from a large amount of information and provide it to users, so that users can be freed from complicated information. Commonly used recommendation system technologies include content-based recommendation systems, collaborative filtering-based recommendation systems, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
CPCG06F16/337G06F16/9535
Inventor 王亮吴书王保兴
Owner INST OF AUTOMATION CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products