Professional Documents
Culture Documents
1st Review PDF
1st Review PDF
1st Review PDF
BATCH NO.
STUDENT NAME
ROLL NO.
G.NEERAJA
2012503551
56 hrs
R.DEEPIKA
2012503540
56hrs
K.LENAVATHI
2012503546
56hrs
T.KEERTHANA
2012503516
52hrs
GUIDE NAME
DR.S.THAMARAI
SELVI
DOMAIN
Big Data Analytics - Recommender system and collaborative
filtering
OBJECTIVE
To design a shilling attack prevention algorithm which
detects and flags the fake user profiles by their history of
ratings.
PROPOSED SYSTEM
Implement the user-user Collaborative Filtering algorithm for
recommendations with MovieLens 1M dataset where the dataset is
injected with fake profiles created with attack models.
DWT is used to extract the features which is used by SVM for classifying
the profiles.
CHALLENGES ADDRESSED
.
DWT can be used instead of HHT when,
The speed of the transform implementation is crucial, and
The exact value of the instantaneous frequency is not as
important as its relative change.
Feature
HHT
DWT
Completeness
Yes
Yes
Slow
Fast
Yes
Yes
Inverse transform
No
Yes
Generating
rating series
Generating
DWT
scalogram
Amplitue
phase,
frequency of
DWT signal
Calculating
feature
values
Generate
feature
set
SVM
based
classifier
Detection
results
PHASE I
OBJECTIVE:
To Prevent shilling attack by detecting fake users by applying
Discrete Waveform Transform on users rating series and Using Support
Vector Machines to classify the users.
MODULES:
1. User based CF algorithm using LensKit
2. DWT on sample novelty and popularity based rating series
3. SVM training, testing for model feature set.
LITERATURE SURVEY-PHASE II
Defending Grey Attacks by Exploiting Wavelet Analysis in
Collaborative Filtering Recommender Systems
Zhihai Yang, Journal of Advanced Research in Artificial Intelligence , Vol. 4, 2015
PHASE II WORK
Module 1:
Inject fake profiles users into genuine user database
Module 2:
Generate Novelty and Popularity based rating series.
Module 3:
Extract 17 features from the DWT Scalogram .
Module 4:
Calculate Performance metrics and validation.
Procedure:
FSUII ratio between number of items rated by user u and the total
number of entire items rated by user u.
FSUII ratio between number of items rated by user u and the total
number of entire items rated by user u.
WHY 17 FEATURES ?
We take 17 features for the following reasons:
NBAA, AAPI, APPI - to distinguish all types of attack profiles
NBAP, AAUI
AIFP
Detection rate:
PRELIMINARY RESULT:
Attack model vector has been created which has to be written
into dataset files.
Screenshots:
LENSKIT ALGORITHM EVALUATOR:
TIMELINE:
65% completion of implementation - 8/3/16
Implementation completion
- 5/4/16
Performance validation
- 12/4/16
REFERENCES:
[3] Alper , Zeynep Ozdemira, Huseyin Polata, A novel shilling attack detection
method, in the Proceedings of the International Conference on Information
Technology and Quantitative Management, pp.166-167, 2014
[5]Sanjog Ray Ambuj Mahanti,Filler Item Strategies for Shilling Attacks against
Recommender Systems in Proceedings of the Hawaii International Conference on
System Sciences ,pp . 1 -10,2009
[6]Ihsan Gunes, Cihan Kaleli, Alper Bilge , Useyin Polat, Shilling attacks against
recommender systems: a comprehensive survey,in the Journal of the Artificial
Intellingence review, Vol. 42, pp 767-799, 2014.