The Performance of Location Aware Shilling Attacks in Web Service Recommendation
Min Gao,
Xiang Li,
Wenge Rong,
Junhao Wen and
Qingyu Xiong
Additional contact information
Min Gao: Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China & School of Software Engineering, Chongqing University, Chongqing, China
Xiang Li: Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China & School of Software Engineering, Chongqing University, Chongqing, China
Wenge Rong: State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China, Research Institute of Beihang University in Shenzhen, Shenzhen, China
Junhao Wen: Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China & School of Software Engineering, Chongqing University, Chongqing, China
Qingyu Xiong: Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China & School of Software Engineering, Chongqing University, Chongqing, China
International Journal of Web Services Research (IJWSR), 2017, vol. 14, issue 3, 53-66
Abstract:
The location aware collaborative filtering (LACF) is one of the most successful technique of predicting the Quality of Service (QoS) in Internet of Things (IoT) service recommendation systems. However, the openness of CF web service recommendation renders them vulnerable to the injection of attack profiles consisting of apocryphal QoS values (also identified as shilling attacks). Combined with location factors, such profiles might exert greater impact on the LACF compared with traditional CF method. Unfortunately, to the best of the authors' knowledge, there is few research on such kind of attack model in the literature. Therefore, in this paper, the authors first construct three kinds of attack models including LAA, LAB, and LAR (location aware - average, bandwagon, and random) models and compare the impact of the classical shilling attacks (CSA) and location aware shilling attacks (LASA) on LACF. Furthermore, the authors use two attack detectors to compare the robustness of CSA and LASA. The experimental results on WS-DREAM dataset indicate that the LACF indeed suffers from CSA and LASA. Besides, in comparison with CSA, the LASA models do not always exert more influence on the LACF and the profiles injected by LASA are easier to be detected.
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
http://services.igi-global.com/resolvedoi/resolve. ... 018/IJWSR.2017070104 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:igg:jwsr00:v:14:y:2017:i:3:p:53-66
Access Statistics for this article
International Journal of Web Services Research (IJWSR) is currently edited by Liang-Jie Zhang
More articles in International Journal of Web Services Research (IJWSR) from IGI Global
Bibliographic data for series maintained by Journal Editor ().