首页 | 本学科首页   官方微博 | 高级检索  
     

基于评分离散度的托攻击检测算法
引用本文:贾俊杰,段超强.基于评分离散度的托攻击检测算法[J].计算机工程与科学,2022,44(3):554-562.
作者姓名:贾俊杰  段超强
作者单位:(西北师范大学计算机科学与工程学院,甘肃 兰州 730070)
基金项目:国家自然科学基金;甘肃省高等学校创新能力提升项目
摘    要:检测托攻击的本质是对真实用户和虚假用户进行分类,现有的检测算法对于具有选择项的流行攻击、段攻击等攻击方式的检测鲁棒性较差.针对这一问题,通过分析真实用户和虚假用户的评分分布情况,结合ID3决策树提出基于用户评分离散度的托攻击检测Dispersion-C算法.算法通过用户评分极端评分比、去极端评分方差和用户评分标准差3个...

关 键 词:推荐系统  托攻击检测  评分离散度  决策树
收稿时间:2020-08-16
修稿时间:2020-11-26

A shilling attack detection algorithm based on score dispersion
JIA Jun-jie,DUAN Chao-qiang.A shilling attack detection algorithm based on score dispersion[J].Computer Engineering & Science,2022,44(3):554-562.
Authors:JIA Jun-jie  DUAN Chao-qiang
Affiliation:(School of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China)
Abstract:The essence of detecting shilling attacks is to classify real users and fake users. The existing detection algorithms have poor detection robustness against bandwagon attacks and segment attacks with options. To solve this problem, by analyzing the different distributions of ratings of real users and fake users, combined with ID3 decision tree, a shilling attack detection algorithm based on user score dispersion is proposed. The algorithm measures the dispersion of user scores by using three features: extreme score ratio, de-extreme score variance, and user score standard deviation, and uses it as the classification feature of the ID3 decision tree algorithm. According to the information gain of different features, the feature is selected as the classification attribute, and the classifier is trained. Experiments show that the algorithm has a good detection effect on all kinds of shilling attacks, and has good robustness.
Keywords:recommendation system  shilling attack detection  score dispersion  decision tree  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号