Introduction

With the advancement of recommender systems, various techniques are employed to influence the output of recommender systems to promote or demote a particular product. Attacks are the inserting of bogus data into a recommendation system. Collaborative Filtering based Recommender Systems are the most sensitive systems to attacks in which malicious users insert fake profiles into the rating database in order to bias the system’s output (these types of attacks are known as profile injection or Shilling attacks). Purpose of the attacks can be different: to push(push attack)/decrease(nuke attack) some items’ ratings by manipulating the recommender system, manipulation of the “Internet opinion” or simply to sabotage the system.

The attacks technique is to create numerous fake accounts / profiles and issue high or low ratings to the “target item”.

The general description of the profile of a true user and fake user are characterized as 80% unrated items and 20% rated items for the “true” profile" , whrereas “fake”" profile consists of 20% unrated items and 80% rated (target items + selected items + filler items). From above description of trusted and fake user profile it is clear that to attack a recommender system, attack profile need to be designed as statistically identical to genuine profile as possible.

Types Of Attacks

To reduce this risk, various detection techniques have been proposed to detect such attacks, which use diverse features extracted from user profiles. Detection Techniques can be described as some descriptive statistics that can be used to capture some of the major characteristics that make an attacker’s profile look different from genuine user’s profile.

Countermeasures

Example of recommender system attacks:

Amazon product’s reviews is distorted with thousands of fake ones. False reviews were helping unknown brands dominate searches for popular items. Hundreds of unverified five-star reviews were being posted on product pages in a single day. Many product pages also included positive reviews for completely different items.

Sources:

https://pdfs.semanticscholar.org/5c7e/96dcaf253f37904f91fdb6fdd6f486dba134.pdf

https://www.math.uci.edu/icamp/courses/math77b/lecture_12w/pdfs/Chapter%2009%20-%20Attacks%20on%20collaborative%20recommender%20systems.pdf

https://arxiv.org/pdf/1506.05752.pdf

https://www.cnbc.com/2019/04/16/amazon-flooded-with-thousands-of-fake-reviews-report-claims.html

https://www.researchgate.net/publication/220886806_Social_Manipulation_of_Online_Recommender_Systems

http://www.ijarcs.info/index.php/Ijarcs/article/viewFile/4550/4100