Loading…

Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection

Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamen...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on information forensics and security 2022, Vol.17, p.531-546
Main Authors: Yang, Zhihai, Sun, Qindong, Liu, Zhaoli
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023
cites cdi_FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023
container_end_page 546
container_issue
container_start_page 531
container_title IEEE transactions on information forensics and security
container_volume 17
creator Yang, Zhihai
Sun, Qindong
Liu, Zhaoli
description Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamental vulnerabilities and openness. With the endless emergence of new attacks, how to provide a feasible way for defending different malicious threats against online recommendations is still an under-explored issue. In this paper, we explore a new way to defend malicious injection attacks through user intention understanding and influential neighbour disclosure. Specifically, we propose a detection approach, termed TBOS ( T hree B irds with O ne S tone), to deal with different malicious threats. In TBOS , we first develop the discrimination of attack target by combining global influence evaluation and risk attitude estimation of users. In order to make TBOS controllable, second, we propose to incorporate an optimal denoising mechanism to remove disturbed information before detection. To enhance the representativeness and predictability of detection model, finally, we propose to leverage a behavioral label propagation mechanism based on constructed label space for the determination of malicious injection behaviors. Extensive experiments on both synthetic and real data demonstrate that TBOS outperforms all baselines in different cases. Particularly, the detection performance of TBOS can achieve an improvement of 6.08% FAR (false alarm rate) for optimal-injection attacks, an improvement of 3.83% FAR in average for co-visitation injection attacks, as well as an improvement of 2.3% for profile injection attacks over benchmarks in terms of FAR while keeping the highest DR (detection rate). Additional experiments on real-world data show that TBOS brings an improvement with the advantage of 6.5% FAR in average compared with baselines.
doi_str_mv 10.1109/TIFS.2022.3146769
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIFS_2022_3146769</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9693911</ieee_id><sourcerecordid>2626976918</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhC0EEqXwAIiLJc4t_kmcmFuhFCpV9NBWHKPE2bQuwS62c0C8PAmpeprVzsyu9CF0S8mYUiIf1vPZaswIY2NOI5EIeYYGNI7FSBBGz08z5Zfoyvs9IVFERTpAv-udA8BP2pUef-iww0sDeBWsgUe88eDw3AQwQVuDN6YE50NuSm22uJXWq-qmc_Mav4Pe7grr8FR7VVvfOMCV7fp7UP_9SQi5-sRTCP3iGl1Uee3h5qhDtJm9rJ_fRovl6_x5shgpJnkYKZVHacwLzpWSVV7SNKaEJrKQKiVpXMQpJyWRJY-4FJUqCk4ET5IEkiKuIsL4EN33dw_OfjfgQ7a3jTPty4wJJmRLi6ZtivYp5az3Dqrs4PRX7n4ySrKOcdYxzjrG2ZFx27nrOxoATnnZOpJS_gfRpnij</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2626976918</pqid></control><display><type>article</type><title>Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Yang, Zhihai ; Sun, Qindong ; Liu, Zhaoli</creator><creatorcontrib>Yang, Zhihai ; Sun, Qindong ; Liu, Zhaoli</creatorcontrib><description>Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamental vulnerabilities and openness. With the endless emergence of new attacks, how to provide a feasible way for defending different malicious threats against online recommendations is still an under-explored issue. In this paper, we explore a new way to defend malicious injection attacks through user intention understanding and influential neighbour disclosure. Specifically, we propose a detection approach, termed TBOS ( T hree B irds with O ne S tone), to deal with different malicious threats. In TBOS , we first develop the discrimination of attack target by combining global influence evaluation and risk attitude estimation of users. In order to make TBOS controllable, second, we propose to incorporate an optimal denoising mechanism to remove disturbed information before detection. To enhance the representativeness and predictability of detection model, finally, we propose to leverage a behavioral label propagation mechanism based on constructed label space for the determination of malicious injection behaviors. Extensive experiments on both synthetic and real data demonstrate that TBOS outperforms all baselines in different cases. Particularly, the detection performance of TBOS can achieve an improvement of 6.08% FAR (false alarm rate) for optimal-injection attacks, an improvement of 3.83% FAR in average for co-visitation injection attacks, as well as an improvement of 2.3% for profile injection attacks over benchmarks in terms of FAR while keeping the highest DR (detection rate). Additional experiments on real-world data show that TBOS brings an improvement with the advantage of 6.5% FAR in average compared with baselines.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2022.3146769</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>attack detection ; behavior representation ; Birds ; Customer services ; Customers ; Estimation ; False alarms ; Injection attack ; performance analysis ; Position measurement ; Predictive models ; Recommender systems ; Sun ; Technological innovation ; Web services</subject><ispartof>IEEE transactions on information forensics and security, 2022, Vol.17, p.531-546</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023</citedby><cites>FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023</cites><orcidid>0000-0003-2019-7886 ; 0000-0003-1590-2587</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9693911$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,4014,27914,27915,27916,54787</link.rule.ids></links><search><creatorcontrib>Yang, Zhihai</creatorcontrib><creatorcontrib>Sun, Qindong</creatorcontrib><creatorcontrib>Liu, Zhaoli</creatorcontrib><title>Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamental vulnerabilities and openness. With the endless emergence of new attacks, how to provide a feasible way for defending different malicious threats against online recommendations is still an under-explored issue. In this paper, we explore a new way to defend malicious injection attacks through user intention understanding and influential neighbour disclosure. Specifically, we propose a detection approach, termed TBOS ( T hree B irds with O ne S tone), to deal with different malicious threats. In TBOS , we first develop the discrimination of attack target by combining global influence evaluation and risk attitude estimation of users. In order to make TBOS controllable, second, we propose to incorporate an optimal denoising mechanism to remove disturbed information before detection. To enhance the representativeness and predictability of detection model, finally, we propose to leverage a behavioral label propagation mechanism based on constructed label space for the determination of malicious injection behaviors. Extensive experiments on both synthetic and real data demonstrate that TBOS outperforms all baselines in different cases. Particularly, the detection performance of TBOS can achieve an improvement of 6.08% FAR (false alarm rate) for optimal-injection attacks, an improvement of 3.83% FAR in average for co-visitation injection attacks, as well as an improvement of 2.3% for profile injection attacks over benchmarks in terms of FAR while keeping the highest DR (detection rate). Additional experiments on real-world data show that TBOS brings an improvement with the advantage of 6.5% FAR in average compared with baselines.</description><subject>attack detection</subject><subject>behavior representation</subject><subject>Birds</subject><subject>Customer services</subject><subject>Customers</subject><subject>Estimation</subject><subject>False alarms</subject><subject>Injection attack</subject><subject>performance analysis</subject><subject>Position measurement</subject><subject>Predictive models</subject><subject>Recommender systems</subject><subject>Sun</subject><subject>Technological innovation</subject><subject>Web services</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNo9kM1OwzAQhC0EEqXwAIiLJc4t_kmcmFuhFCpV9NBWHKPE2bQuwS62c0C8PAmpeprVzsyu9CF0S8mYUiIf1vPZaswIY2NOI5EIeYYGNI7FSBBGz08z5Zfoyvs9IVFERTpAv-udA8BP2pUef-iww0sDeBWsgUe88eDw3AQwQVuDN6YE50NuSm22uJXWq-qmc_Mav4Pe7grr8FR7VVvfOMCV7fp7UP_9SQi5-sRTCP3iGl1Uee3h5qhDtJm9rJ_fRovl6_x5shgpJnkYKZVHacwLzpWSVV7SNKaEJrKQKiVpXMQpJyWRJY-4FJUqCk4ET5IEkiKuIsL4EN33dw_OfjfgQ7a3jTPty4wJJmRLi6ZtivYp5az3Dqrs4PRX7n4ySrKOcdYxzjrG2ZFx27nrOxoATnnZOpJS_gfRpnij</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Yang, Zhihai</creator><creator>Sun, Qindong</creator><creator>Liu, Zhaoli</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-2019-7886</orcidid><orcidid>https://orcid.org/0000-0003-1590-2587</orcidid></search><sort><creationdate>2022</creationdate><title>Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection</title><author>Yang, Zhihai ; Sun, Qindong ; Liu, Zhaoli</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>attack detection</topic><topic>behavior representation</topic><topic>Birds</topic><topic>Customer services</topic><topic>Customers</topic><topic>Estimation</topic><topic>False alarms</topic><topic>Injection attack</topic><topic>performance analysis</topic><topic>Position measurement</topic><topic>Predictive models</topic><topic>Recommender systems</topic><topic>Sun</topic><topic>Technological innovation</topic><topic>Web services</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yang, Zhihai</creatorcontrib><creatorcontrib>Sun, Qindong</creatorcontrib><creatorcontrib>Liu, Zhaoli</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yang, Zhihai</au><au>Sun, Qindong</au><au>Liu, Zhaoli</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2022</date><risdate>2022</risdate><volume>17</volume><spage>531</spage><epage>546</epage><pages>531-546</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamental vulnerabilities and openness. With the endless emergence of new attacks, how to provide a feasible way for defending different malicious threats against online recommendations is still an under-explored issue. In this paper, we explore a new way to defend malicious injection attacks through user intention understanding and influential neighbour disclosure. Specifically, we propose a detection approach, termed TBOS ( T hree B irds with O ne S tone), to deal with different malicious threats. In TBOS , we first develop the discrimination of attack target by combining global influence evaluation and risk attitude estimation of users. In order to make TBOS controllable, second, we propose to incorporate an optimal denoising mechanism to remove disturbed information before detection. To enhance the representativeness and predictability of detection model, finally, we propose to leverage a behavioral label propagation mechanism based on constructed label space for the determination of malicious injection behaviors. Extensive experiments on both synthetic and real data demonstrate that TBOS outperforms all baselines in different cases. Particularly, the detection performance of TBOS can achieve an improvement of 6.08% FAR (false alarm rate) for optimal-injection attacks, an improvement of 3.83% FAR in average for co-visitation injection attacks, as well as an improvement of 2.3% for profile injection attacks over benchmarks in terms of FAR while keeping the highest DR (detection rate). Additional experiments on real-world data show that TBOS brings an improvement with the advantage of 6.5% FAR in average compared with baselines.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2022.3146769</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-2019-7886</orcidid><orcidid>https://orcid.org/0000-0003-1590-2587</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2022, Vol.17, p.531-546
issn 1556-6013
1556-6021
language eng
recordid cdi_crossref_primary_10_1109_TIFS_2022_3146769
source IEEE Electronic Library (IEL) Journals
subjects attack detection
behavior representation
Birds
Customer services
Customers
Estimation
False alarms
Injection attack
performance analysis
Position measurement
Predictive models
Recommender systems
Sun
Technological innovation
Web services
title Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T23%3A59%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Three%20Birds%20With%20One%20Stone:%20User%20Intention%20Understanding%20and%20Influential%20Neighbor%20Disclosure%20for%20Injection%20Attack%20Detection&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Yang,%20Zhihai&rft.date=2022&rft.volume=17&rft.spage=531&rft.epage=546&rft.pages=531-546&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2022.3146769&rft_dat=%3Cproquest_cross%3E2626976918%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2626976918&rft_id=info:pmid/&rft_ieee_id=9693911&rfr_iscdi=true