4.6 Article

An unsupervised detection method for shilling attacks based on deep learning and community detection

Journal

SOFT COMPUTING
Volume 25, Issue 1, Pages 477-494

Publisher

SPRINGER
DOI: 10.1007/s00500-020-05162-6

Keywords

Shilling attack; Unsupervised detection; Deep learning; Community detection

Funding

  1. National Natural Science Foundation of China [61772452, 61379116]
  2. Scientific and Technology Innovation Program of Higher Education Institutions in Shanxi, China [2019L0847]
  3. Youth Project of Humanities and Social Sciences Financed by Ministry of Education, China [20YJC630034]
  4. Natural Science Foundation of Hebei Province, China [F2015203046]

Ask authors/readers for more resources

This study proposes an unsupervised method based on deep learning and community detection for shilling attack detection. Experimental results show that the proposed method outperforms some baseline detectors in detecting simulated attacks and actual attacks.
In the detection methods for shilling attacks, the supervised methods require labeled samples to train the classifiers. Due to lack of the labeled sample profiles in real scenarios, the applicability of supervised detection method is restricted. For unsupervised methods, the prior knowledge is often required to guarantee the detection accuracy. To break the traditional limitations, we present an unsupervised method to detect various shilling profiles from reconstructed user-user graph based on deep learning and community detection. Firstly, we construct the user-user graph, whose edge weight is calculated by the similarity of user's behaviors. Secondly, the stacked denoising autoencoders are used to extract the robust graph features at different scales with different corruption rates. Based on the features at different scales, we generate multiple clustering results and reconstruct the user-user graph by evidence accumulation method. Thirdly, the community detection is carried out by using the persistence optimization algorithm. Extensive experiments on two datasets illustrate that our proposed method has better performance than some baseline detectors for detecting the simulated attacks and actual attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available