Loading…
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection
Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamen...
Saved in:
Published in: | IEEE transactions on information forensics and security 2022, Vol.17, p.531-546 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023 |
---|---|
cites | cdi_FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023 |
container_end_page | 546 |
container_issue | |
container_start_page | 531 |
container_title | IEEE transactions on information forensics and security |
container_volume | 17 |
creator | Yang, Zhihai Sun, Qindong Liu, Zhaoli |
description | Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamental vulnerabilities and openness. With the endless emergence of new attacks, how to provide a feasible way for defending different malicious threats against online recommendations is still an under-explored issue. In this paper, we explore a new way to defend malicious injection attacks through user intention understanding and influential neighbour disclosure. Specifically, we propose a detection approach, termed TBOS ( T hree B irds with O ne S tone), to deal with different malicious threats. In TBOS , we first develop the discrimination of attack target by combining global influence evaluation and risk attitude estimation of users. In order to make TBOS controllable, second, we propose to incorporate an optimal denoising mechanism to remove disturbed information before detection. To enhance the representativeness and predictability of detection model, finally, we propose to leverage a behavioral label propagation mechanism based on constructed label space for the determination of malicious injection behaviors. Extensive experiments on both synthetic and real data demonstrate that TBOS outperforms all baselines in different cases. Particularly, the detection performance of TBOS can achieve an improvement of 6.08% FAR (false alarm rate) for optimal-injection attacks, an improvement of 3.83% FAR in average for co-visitation injection attacks, as well as an improvement of 2.3% for profile injection attacks over benchmarks in terms of FAR while keeping the highest DR (detection rate). Additional experiments on real-world data show that TBOS brings an improvement with the advantage of 6.5% FAR in average compared with baselines. |
doi_str_mv | 10.1109/TIFS.2022.3146769 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TIFS_2022_3146769</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9693911</ieee_id><sourcerecordid>2626976918</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023</originalsourceid><addsrcrecordid>eNo9kM1OwzAQhC0EEqXwAIiLJc4t_kmcmFuhFCpV9NBWHKPE2bQuwS62c0C8PAmpeprVzsyu9CF0S8mYUiIf1vPZaswIY2NOI5EIeYYGNI7FSBBGz08z5Zfoyvs9IVFERTpAv-udA8BP2pUef-iww0sDeBWsgUe88eDw3AQwQVuDN6YE50NuSm22uJXWq-qmc_Mav4Pe7grr8FR7VVvfOMCV7fp7UP_9SQi5-sRTCP3iGl1Uee3h5qhDtJm9rJ_fRovl6_x5shgpJnkYKZVHacwLzpWSVV7SNKaEJrKQKiVpXMQpJyWRJY-4FJUqCk4ET5IEkiKuIsL4EN33dw_OfjfgQ7a3jTPty4wJJmRLi6ZtivYp5az3Dqrs4PRX7n4ySrKOcdYxzjrG2ZFx27nrOxoATnnZOpJS_gfRpnij</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2626976918</pqid></control><display><type>article</type><title>Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Yang, Zhihai ; Sun, Qindong ; Liu, Zhaoli</creator><creatorcontrib>Yang, Zhihai ; Sun, Qindong ; Liu, Zhaoli</creatorcontrib><description>Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamental vulnerabilities and openness. With the endless emergence of new attacks, how to provide a feasible way for defending different malicious threats against online recommendations is still an under-explored issue. In this paper, we explore a new way to defend malicious injection attacks through user intention understanding and influential neighbour disclosure. Specifically, we propose a detection approach, termed TBOS ( T hree B irds with O ne S tone), to deal with different malicious threats. In TBOS , we first develop the discrimination of attack target by combining global influence evaluation and risk attitude estimation of users. In order to make TBOS controllable, second, we propose to incorporate an optimal denoising mechanism to remove disturbed information before detection. To enhance the representativeness and predictability of detection model, finally, we propose to leverage a behavioral label propagation mechanism based on constructed label space for the determination of malicious injection behaviors. Extensive experiments on both synthetic and real data demonstrate that TBOS outperforms all baselines in different cases. Particularly, the detection performance of TBOS can achieve an improvement of 6.08% FAR (false alarm rate) for optimal-injection attacks, an improvement of 3.83% FAR in average for co-visitation injection attacks, as well as an improvement of 2.3% for profile injection attacks over benchmarks in terms of FAR while keeping the highest DR (detection rate). Additional experiments on real-world data show that TBOS brings an improvement with the advantage of 6.5% FAR in average compared with baselines.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2022.3146769</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>attack detection ; behavior representation ; Birds ; Customer services ; Customers ; Estimation ; False alarms ; Injection attack ; performance analysis ; Position measurement ; Predictive models ; Recommender systems ; Sun ; Technological innovation ; Web services</subject><ispartof>IEEE transactions on information forensics and security, 2022, Vol.17, p.531-546</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023</citedby><cites>FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023</cites><orcidid>0000-0003-2019-7886 ; 0000-0003-1590-2587</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9693911$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,4014,27914,27915,27916,54787</link.rule.ids></links><search><creatorcontrib>Yang, Zhihai</creatorcontrib><creatorcontrib>Sun, Qindong</creatorcontrib><creatorcontrib>Liu, Zhaoli</creatorcontrib><title>Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamental vulnerabilities and openness. With the endless emergence of new attacks, how to provide a feasible way for defending different malicious threats against online recommendations is still an under-explored issue. In this paper, we explore a new way to defend malicious injection attacks through user intention understanding and influential neighbour disclosure. Specifically, we propose a detection approach, termed TBOS ( T hree B irds with O ne S tone), to deal with different malicious threats. In TBOS , we first develop the discrimination of attack target by combining global influence evaluation and risk attitude estimation of users. In order to make TBOS controllable, second, we propose to incorporate an optimal denoising mechanism to remove disturbed information before detection. To enhance the representativeness and predictability of detection model, finally, we propose to leverage a behavioral label propagation mechanism based on constructed label space for the determination of malicious injection behaviors. Extensive experiments on both synthetic and real data demonstrate that TBOS outperforms all baselines in different cases. Particularly, the detection performance of TBOS can achieve an improvement of 6.08% FAR (false alarm rate) for optimal-injection attacks, an improvement of 3.83% FAR in average for co-visitation injection attacks, as well as an improvement of 2.3% for profile injection attacks over benchmarks in terms of FAR while keeping the highest DR (detection rate). Additional experiments on real-world data show that TBOS brings an improvement with the advantage of 6.5% FAR in average compared with baselines.</description><subject>attack detection</subject><subject>behavior representation</subject><subject>Birds</subject><subject>Customer services</subject><subject>Customers</subject><subject>Estimation</subject><subject>False alarms</subject><subject>Injection attack</subject><subject>performance analysis</subject><subject>Position measurement</subject><subject>Predictive models</subject><subject>Recommender systems</subject><subject>Sun</subject><subject>Technological innovation</subject><subject>Web services</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNo9kM1OwzAQhC0EEqXwAIiLJc4t_kmcmFuhFCpV9NBWHKPE2bQuwS62c0C8PAmpeprVzsyu9CF0S8mYUiIf1vPZaswIY2NOI5EIeYYGNI7FSBBGz08z5Zfoyvs9IVFERTpAv-udA8BP2pUef-iww0sDeBWsgUe88eDw3AQwQVuDN6YE50NuSm22uJXWq-qmc_Mav4Pe7grr8FR7VVvfOMCV7fp7UP_9SQi5-sRTCP3iGl1Uee3h5qhDtJm9rJ_fRovl6_x5shgpJnkYKZVHacwLzpWSVV7SNKaEJrKQKiVpXMQpJyWRJY-4FJUqCk4ET5IEkiKuIsL4EN33dw_OfjfgQ7a3jTPty4wJJmRLi6ZtivYp5az3Dqrs4PRX7n4ySrKOcdYxzjrG2ZFx27nrOxoATnnZOpJS_gfRpnij</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Yang, Zhihai</creator><creator>Sun, Qindong</creator><creator>Liu, Zhaoli</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-2019-7886</orcidid><orcidid>https://orcid.org/0000-0003-1590-2587</orcidid></search><sort><creationdate>2022</creationdate><title>Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection</title><author>Yang, Zhihai ; Sun, Qindong ; Liu, Zhaoli</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>attack detection</topic><topic>behavior representation</topic><topic>Birds</topic><topic>Customer services</topic><topic>Customers</topic><topic>Estimation</topic><topic>False alarms</topic><topic>Injection attack</topic><topic>performance analysis</topic><topic>Position measurement</topic><topic>Predictive models</topic><topic>Recommender systems</topic><topic>Sun</topic><topic>Technological innovation</topic><topic>Web services</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Yang, Zhihai</creatorcontrib><creatorcontrib>Sun, Qindong</creatorcontrib><creatorcontrib>Liu, Zhaoli</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Yang, Zhihai</au><au>Sun, Qindong</au><au>Liu, Zhaoli</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2022</date><risdate>2022</risdate><volume>17</volume><spage>531</spage><epage>546</epage><pages>531-546</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>Recommender system, as a data-driven way to help customers locate products that match their interests, is increasingly critical for providing competitive customer suggestions in many web services. However, recommender systems are highly vulnerable to malicious injection attacks due to their fundamental vulnerabilities and openness. With the endless emergence of new attacks, how to provide a feasible way for defending different malicious threats against online recommendations is still an under-explored issue. In this paper, we explore a new way to defend malicious injection attacks through user intention understanding and influential neighbour disclosure. Specifically, we propose a detection approach, termed TBOS ( T hree B irds with O ne S tone), to deal with different malicious threats. In TBOS , we first develop the discrimination of attack target by combining global influence evaluation and risk attitude estimation of users. In order to make TBOS controllable, second, we propose to incorporate an optimal denoising mechanism to remove disturbed information before detection. To enhance the representativeness and predictability of detection model, finally, we propose to leverage a behavioral label propagation mechanism based on constructed label space for the determination of malicious injection behaviors. Extensive experiments on both synthetic and real data demonstrate that TBOS outperforms all baselines in different cases. Particularly, the detection performance of TBOS can achieve an improvement of 6.08% FAR (false alarm rate) for optimal-injection attacks, an improvement of 3.83% FAR in average for co-visitation injection attacks, as well as an improvement of 2.3% for profile injection attacks over benchmarks in terms of FAR while keeping the highest DR (detection rate). Additional experiments on real-world data show that TBOS brings an improvement with the advantage of 6.5% FAR in average compared with baselines.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2022.3146769</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-2019-7886</orcidid><orcidid>https://orcid.org/0000-0003-1590-2587</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2022, Vol.17, p.531-546 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TIFS_2022_3146769 |
source | IEEE Electronic Library (IEL) Journals |
subjects | attack detection behavior representation Birds Customer services Customers Estimation False alarms Injection attack performance analysis Position measurement Predictive models Recommender systems Sun Technological innovation Web services |
title | Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T23%3A59%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Three%20Birds%20With%20One%20Stone:%20User%20Intention%20Understanding%20and%20Influential%20Neighbor%20Disclosure%20for%20Injection%20Attack%20Detection&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Yang,%20Zhihai&rft.date=2022&rft.volume=17&rft.spage=531&rft.epage=546&rft.pages=531-546&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2022.3146769&rft_dat=%3Cproquest_cross%3E2626976918%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c293t-cca4853b33cc9fad18510179b9c8085b5830d09d34396fcbb3063777e7b5f4023%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2626976918&rft_id=info:pmid/&rft_ieee_id=9693911&rfr_iscdi=true |