Supercharge Your Innovation With Domain-Expert AI Agents!

Shilling attack detection method and system based on dynamic knowledge graph, equipment and medium

A technology of knowledge graph and attack detection, applied in the field of trust attack detection, can solve the problems of high cost of manual labeling samples, weak robustness, little consideration of user dynamic relationship, etc.

Pending Publication Date: 2021-12-17
BEIJING UNIVERSITY OF CIVIL ENGINEERING AND ARCHITECTURE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Supervised detection methods mainly detect troll attacks by training classifiers, such as extracting features from user registration information, user posting content and other information to build classifiers. Supervised detection methods require a large number of samples, and manual labeling of samples is costly; The unsupervised detection method mainly uses the topological relationship of the social network to identify abnormal points in the network, such as the detection method of clustering posts by using the similarity between text and URL, etc. The unsupervised detection method has a high false positive rate and low robustness. slightly inferior; while the semi-supervised detection methods that combine the two mostly start from the similarity between users, user ratings, etc., and rarely consider the dynamic relationship between users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shilling attack detection method and system based on dynamic knowledge graph, equipment and medium
  • Shilling attack detection method and system based on dynamic knowledge graph, equipment and medium
  • Shilling attack detection method and system based on dynamic knowledge graph, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0082] Combine below Figure 1-Figure 3 The trolling attack detection method based on the dynamic knowledge graph of the present invention is described.

[0083] The present invention's detection method based on dynamic knowledge map, such as figure 1 shown, including steps:

[0084] S1: Collect user information.

[0085] Specifically, S1 includes:

[0086] S11: collect user set R, where, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a shilling attack detection method based on a dynamic knowledge graph. The shilling attack detection method comprises the following steps: collecting user information; calculating personal preferences and social styles of the users; establishing a user relationship dynamic knowledge graph in combination with the change of the user relationship along with the dynamic change factor; and according to the condition that the user relationship of the real user changes along with the dynamic change factor and the user relationship of the shilling attack user does not change along with the dynamic change factor after the propagation capability goes through, carrying out user clustering on the user relationship dynamic knowledge graph by utilizing a graph group clustering method so as to detect the shilling attack user. According to the shilling attack detection method based on the dynamic knowledge graph, the user is simulated as a social sensor, the user relationship dynamic knowledge graph is established in combination with the change of the user relationship along with the dynamic change factor, and the dynamic change of the user relationship in the social activity is accurately described; the shilling attack users are analyzed and detected by gathering the user relationships which change along with the dynamic change factors at a plurality of moments, and the shilling attack users can be detected more accurately.

Description

technical field [0001] The present invention relates to the technical field of trolling attack detection, in particular to a trolling attack detection method, system, device and computer-readable storage medium based on a dynamic knowledge graph. Background technique [0002] With the continuous development of Internet technology, especially the explosive growth of news, commodities and entertainment resources, people also face a serious problem of information overload when they turn to the Internet to search for the items they need. In order to provide people with information quickly and accurately, recommender systems are widely used in various fields. Due to the openness and other characteristics of the recommendation system itself, it gives the opportunity for users to inject false ratings and false social relationships into the system. Among them, the attacking user changes the real user's social relationship by establishing a large number of false relationships with o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q50/00G06F16/36G06K9/62
CPCG06Q50/01G06F16/367G06F18/23G06F18/25
Inventor 万珊珊刘颖吕橙邱冬炜蒙翠青孙雷陈卓
Owner BEIJING UNIVERSITY OF CIVIL ENGINEERING AND ARCHITECTURE
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More