Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Sundari, P. Shanmugaa; * | Subaji, M.b
Affiliations: [a] Sri Venkateswara College of Engineering and Technology, Chittoor, Andhra Pradesh, India | [b] Vellore Institute of Technology, Vellore, Tamil Nadu, India
Correspondence: [*] Corresponding author: P. Shanmuga Sundari, Sri Venkateswara College of Engineering and Technology, Chittoor, Andhra Pradesh, India. E-mail: sigashanmu@gmail.com.
Abstract: The recommendation system is affected with attacks when the users are given liberty to rate the items based on their impression about the product or service. Some malicious user or other competitors’ try to inject fake rating to degrade the item’s graces that are mostly adored by several users. Attacks in the rating matrix are not executed just by a single profile. A group of users profile is injected into rating matrix to decrease the performance. It is highly complex to extract the fake ratings from the mixture of genuine profile as it resides the same pattern. Identifying the attacked profile and the target item of the fake rating is a challenging task in the big data environment. This paper proposes a unique method to identify the attacks in collaborating filtering method. The process of extracting fake rating is carried out in two phases. During the initial phase, doubtful user profile is identified from the rating matrix. In the following phase, the target item is analysed using push attack count to reduce the false positive rates from the doubtful user profile. The proposed model is evaluated with detection rate and false positive rates by considering the filler size and attacks size. The experiment was conducted with 6%, 8% and 10% filler sizes and with different attack sizes that ranges from 0%–100%. Various classification techniques such as decision tree, logistic regression, SVM and random forest methods are used to classify the fake ratings. From the results, it is witnessed that SVM model works better with random and bandwagon attack models at an average of 4% higher accuracy. Similarly the decision tree method performance better at an average of 3% on average attack model.
Keywords: Recommendation system, fake ratings, malicious user, various classification techniques, D_SVM, unbalanced data
DOI: 10.3233/IDT-200195
Journal: Intelligent Decision Technologies, vol. 15, no. 3, pp. 443-450, 2021
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl