EconPapers    
Economics at your fingertips  
 

A Sampling-Based Method for Detecting Data Poisoning Attacks in Recommendation Systems

Mohan Li, Yuxin Lian, Jinpeng Zhu, Jingyi Lin, Jiawen Wan and Yanbin Sun ()
Additional contact information
Mohan Li: Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
Yuxin Lian: Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
Jinpeng Zhu: Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
Jingyi Lin: Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
Jiawen Wan: Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
Yanbin Sun: Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China

Mathematics, 2024, vol. 12, issue 2, 1-13

Abstract: The recommendation algorithm based on collaborative filtering is vulnerable to data poisoning attacks, wherein attackers can manipulate system output by injecting a large volume of fake rating data. To address this issue, it is essential to investigate methods for detecting systematically injected poisoning data within the rating matrix. Since attackers often inject a significant quantity of poisoning data in a short period to achieve their desired impact, these data may exhibit spatial proximity. In other words, poisoning data may be concentrated in adjacent rows of the rating matrix. This paper capitalizes on the proximity characteristics of poisoning data in the rating matrix and introduces a sampling-based method for detecting data poisoning attacks. First, we designed a rating matrix sampling method specifically for detecting poisoning data. By sampling differences obtained from the original rating matrix, it is possible to infer the presence of poisoning attacks and effectively discard poisoning data. Second, we developed a method for pinpointing malicious data based on the distance of rating vectors. Through distance calculations, we can accurately identify the positions of malicious data. After that, we validated the method on three real-world datasets. The results demonstrate the effectiveness of our method in identifying malicious data within the rating matrix.

Keywords: data poisoning; recommendation systems; ensemble learning; data poisoning detection (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/12/2/247/pdf (application/pdf)
https://www.mdpi.com/2227-7390/12/2/247/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:12:y:2024:i:2:p:247-:d:1317707

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:12:y:2024:i:2:p:247-:d:1317707