Skip to main content
Log in

ShillDetector: a binary grey wolf optimization technique for detection of shilling profiles

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Collaborative Filtering, though a successful recommendation technique is vulnerable to shilling attacks due to its open nature. These attacks alter recommendations being generated for the user by inserting fake user profiles in the database. To minimize the bias introduced in the recommendation process, many machine learning methods have been explored and shown excellent results. However, supervised machine learning detection techniques are restricted to hand-designed features while unsupervised detection techniques require prior knowledge about fake profiles. In this paper, we propose a novel approach namely, ShillDetector for the detection of shilling attacks based on the recently proposed swarm intelligence technique, grey wolf optimization. The proposed approach works as a dimensionality reduction technique taking advantage of high correlation among shillers and removing correlated features that are redundant. Further, it works directly on the rating matrix, does not require hand-designed features, prior knowledge of attack profiles, or any training time. The performance of ShillDetector has been evaluated on the MovieLens dataset consisting of 100 K ratings. Experimental results depict that ShillDetector outperformed two state-of-the-art approaches, namely, SVM-TIA and PCA-VarSelect approaches with an average precision of 0.99 in case of average attack taken over different attack sizes, viz, 1%, 2%, 5%, and 10%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability statement

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

Notes

  1. https://developers.google.com/machine-learning/recommendation.

  2. https://grouplens.org/datasets/movielens/.

  3. https://grouplens.org/datasets/movielens/

References

  • Al-Tashi Q, Kadir SJA, Rais HM, Mirjalili S, Alhussian H (2019) Binary optimization using hybrid grey wolf optimization for feature selection. IEEE Access 7:39496–39508

    Article  Google Scholar 

  • Al-Tashi Q, Rais HM, Abdulkadir SJ, Mirjalili S, Alhussian H (2020) A review of grey wolf optimizer-based feature selection methods for classification. In evolutionary machine learning techniques. Springer, Singapore, pp 273–286

    Google Scholar 

  • Bansal S, Baliyan N (2019a) A study of recent recommender system techniques. Int J Knowl Syst Sci (IJKSS) 10(2):13–41

    Article  Google Scholar 

  • Bansal S, Baliyan N (2019b) Evaluation of collaborative filtering based recommender systems against segment-based shilling attacks. In: 2019 International Conference on Computing, Power and Communication Technologies (GUCON) (pp 110–114). IEEE

  • Bansal S, Baliyan N (2020) Bi-MARS: a bi-clustering based memetic algorithm for recommender systems. Appl Soft Comput 97:106785

    Article  Google Scholar 

  • Batmaz Z, Yilmazel B, Kaleli C (2020) Shilling attack detection in binary data: a classification approach. J Ambient Intell Humaniz Comput 11(6):2601–2611

    Article  Google Scholar 

  • Bedi P, Gautam A, Bansal S, Bhatia D (2017) Weighted bipartite graph model for recommender system using entropy based similarity measure. In: The International Symposium on Intelligent Systems Technologies and Applications (pp 163–173). Springer, Cham

  • Bilge A, Gunes I, Polat H (2014) Robustness analysis of privacy-preserving model-based recommendation schemes. Expert Syst Appl 41(8):3671–3681

    Article  Google Scholar 

  • Burke R, O’Mahony MP, Hurley NJ (2015) Robust collaborative recommendation. In: Recommender systems handbook. Springer, Boston, pp 961–995

    Book  Google Scholar 

  • Cao G, Zhang H, Fan Y, Kuang L (2018) Finding shilling attack in recommender system based on dynamic feature selection. In SEKE (pp 50–55)

  • Chirita PA, Nejdl W, Zamfir C (2005) Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th annual ACM international workshop on Web information and data management (pp 67–74)

  • Deng ZJ, Zhang F, Wang SP (2016) Shilling attack detection in collaborative filtering recommender system by PCA detection and perturbation. In: 2016 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR) (pp 213–218). IEEE

  • Elhariri E, El-Bendary N, Hassanien AE (2016) Bio-inspired optimization for feature set dimensionality reduction. In: 2016 3rd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA) (pp 184–189). IEEE

  • Emary E, Yamany W, Hassanien AE, Snasel V (2015) Multi-objective gray-wolf optimization for attribute reduction. Procedia Comput Sci 65:623–632

    Article  Google Scholar 

  • Emary E, Zawbaa HM, Hassanien AE (2016) Binary grey wolf optimization approaches for feature selection. Neurocomputing 172:371–381

    Article  Google Scholar 

  • Faris H, Aljarah I, Al-Betar MA, Mirjalili S (2018) Grey wolf optimizer: a review of recent variants and applications. Neural Comput Appl 30(2):413–435

    Article  Google Scholar 

  • Gunes I, Kaleli C, Bilge A, Polat H (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42(4):767–799

    Article  Google Scholar 

  • Hassan HA, Zellagui M (2018) Application of grey wolf optimizer algorithm for optimal power flow of two-terminal HVDC transmission system. Adv Electric Electron Eng 15(5):701–712

    Article  Google Scholar 

  • Hatta NM, Zain AM, Sallehuddin R, Shayfull Z, Yusoff Y (2019) Recent studies on optimisation method of Grey Wolf Optimiser (GWO): a review (2014–2017). Artif Intell Rev 52(4):2651–2683

    Article  Google Scholar 

  • Jannach D, Zanker M, Felfernig A, Friedrich G (2010) Recommender systems: an introduction. Cambridge University Press

    Book  Google Scholar 

  • Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: Proceedings of the 13th international conference on World Wide Web (pp 393–402)

  • Liu X, Xiao Y, Jiao X, Zheng W, Ling Z (2019) A novel Kalman Filter based shilling attack detection algorithm. arXiv preprint arXiv:1908.06968

  • Manikandan K (2019) Diagnosis of diabetes diseases using optimized fuzzy rule set by grey wolf optimization. Pattern Recogn Lett 125:432–438

    Article  Google Scholar 

  • Mehta B (2007) Unsupervised shilling detection for collaborative filtering. In AAAI (pp 1402–1407)

  • Mehta B, Nejdl W (2009) Unsupervised strategies for shilling detection and robust collaborative filtering. User Model User-Adap Inter 19(1–2):65–97

    Article  Google Scholar 

  • Mehta B, Hofmann T, Fankhauser P (2007) Lies and propaganda: detecting spam users in collaborative filtering. In: Proceedings of the 12th international conference on Intelligent user interfaces (pp 14–21)

  • Mirjalili S (2015) How effective is the Grey Wolf optimizer in training multi-layer perceptrons. Appl Intell 43(1):150–161

    Article  Google Scholar 

  • Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46–61

    Article  Google Scholar 

  • Mobasher B, Burke R, Williams C, Bhaumik R (2005) Analysis and detection of segment-focused attacks against collaborative recommendation. In: International Workshop on Knowledge Discovery on the Web. Springer, Berlin, pp 96–118

    Google Scholar 

  • Mobasher B, Burke R, Bhaumik R, Williams C (2007) Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans Internet Technol (TOIT) 7(4):23

    Article  Google Scholar 

  • Pradhan M, Roy PK, Pal T (2018) Oppositional based grey wolf optimization algorithm for economic dispatch problem of power system. Ain Shams Eng J 9(4):2015–2025

    Article  Google Scholar 

  • Sharma P, Sundaram S, Sharma M, Sharma A, Gupta D (2019) Diagnosis of Parkinson’s disease using modified grey wolf optimization. Cogn Syst Res 54:100–115

    Article  Google Scholar 

  • Sundar AP, Li F, Zou X, Gao T, Russomanno ED (2020) Understanding shilling attacks and their detection traits: a comprehensive survey. IEEE Access 8:171703–171715

    Article  Google Scholar 

  • Tong C, Yin X, Li J, Zhu T, Lv R, Sun L, Rodrigues JJ (2018) A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network. Comput J 61(7):949–958

    Article  Google Scholar 

  • Wang Y, Zhang L, Tao H, Wu Z, Cao J (2015) A comparative study of shilling attack detectors for recommender systems. In: 2015 12th International Conference on Service Systems and Service Management (ICSSSM) (pp 1–6). IEEE

  • Zhang F, Zhang Z, Zhang P, Wang S (2018) UD-HMM: An unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering. Knowl-Based Syst 148:146–166

    Article  Google Scholar 

  • Zhang F, Deng ZJ, He ZM, Lin XC, Sun LL (2018a) Detection of shilling attack in collaborative filtering recommender system by pca and data complexity. In: 2018 International Conference on Machine Learning and Cybernetics (ICMLC) (Vol. 2, pp 673–678). IEEE

  • Zhou W, Wen J, Xiong Q, Gao M, Zeng J (2016) SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems. Neurocomputing 210:197–205

    Article  Google Scholar 

  • Zhou Q, Wu J, Duan L (2020) Recommendation attack detection based on deep learning. J Inf Secur Appl 52:102493

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Niyati Baliyan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bansal, S., Baliyan, N. ShillDetector: a binary grey wolf optimization technique for detection of shilling profiles. J Ambient Intell Human Comput 14, 697–710 (2023). https://doi.org/10.1007/s12652-021-03320-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03320-8

Keywords

Navigation