博碩士論文 101421057 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:17 、訪客IP:18.117.170.135
姓名 顏貝芬(PEI-FEN YEN)  查詢紙本館藏   畢業系所 企業管理學系
論文名稱 以Beta分配的方法在推薦系統中找出被惡意攻擊的產品之研究
相關論文
★ 在社群網站上作互動推薦及研究使用者行為對其效果之影響★ 以AHP法探討伺服器品牌大廠的供應商遴選指標的權重決定分析
★ 以AHP法探討智慧型手機產業營運中心區位選擇考量關鍵因素之研究★ 太陽能光電產業經營績效評估-應用資料包絡分析法
★ 建構國家太陽能電池產業競爭力比較模式之研究★ 以序列採礦方法探討景氣指標與進出口值的關聯
★ ERP專案成員組合對績效影響之研究★ 推薦期刊文章至適合學科類別之研究
★ 品牌故事分析與比較-以古早味美食產業為例★ 以方法目的鏈比較Starbucks與Cama吸引消費者購買因素
★ 探討創意店家創業價值之研究- 以赤峰街、民生社區為例★ 以領先指標預測企業長短期借款變化之研究
★ 應用層級分析法遴選電競筆記型電腦鍵盤供應商之關鍵因子探討★ 以互惠及利他行為探討信任關係對知識分享之影響
★ 結合人格特質與海報主色以類神經網路推薦電影之研究★ 資料視覺化圖表與議題之關聯
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 推薦系統的使用隨著電子商務的急速成長而被廣泛地運用在各行各業,推薦系統可以協助使用者在複雜的環境中做決策,其主要是根據推薦系統本身對使用者和推薦的項目的瞭解,進而推薦項目給使用者,藉此幫助消費者快速找到他們可能會感興趣的資料或產品,其中最常被推薦系統採用的推薦方法為協同過濾式,然而,由於推薦系統處在一個開放式的環境裡,很容易被惡意的攻擊者在評分資料中注入假資料,也就是製造不實的評分、意見或評論,企圖推升或打壓某些項目。

近幾年來,許多偵測攻擊的演算法相繼被提出,然而這些方法的應用仍然受到不同的限制,PCA在偵測攻擊的相關論文有很好的成果,但其缺點在於無法處理在使用者項目矩陣中的遺漏值,導致整個計算出來的結果有很大的誤差,另外,利用SPC的統計方法在做資料分群時,需要每個項目所累積的長期資料,才能作有意義的分群進而訓練數據。

本研究以Beta分配的特性設計了一個偵測攻擊的方法,此方法沒有遺漏值的問題,資料分群也不需要累積一定時間的大量資料,就可以偵測出被攻擊的產品,另外,有別於過去的學者皆假設攻擊者在使用者資料中只攻擊一個目標項目,本研究在實驗中模擬攻擊者攻擊多個目標項目,Beta分配的方法其偵測率達到70%以上,錯殺率則介在10%到20%內。
摘要(英) With the rapid growth of e-commerce, Recommender system is widely used in various walks of life. Recommender systems can help users make decisions in a complex environment, which is mainly based on the understanding of user and item by Recommender system, and then recommend the item to the user. Thereby helping consumers quickly to find the information or products they may be interested in. The most commonly recommended method is Feature-based Filtering. However, due to the recommender system is in an open type of environment, malicious attacker is easy to inject false information into the rating data, which means manufacture false ratings, opinions or comments to push up or suppress certain items.

In recent years, many detection algorithms have been proposed, however the application of these methods are still subject to different restrictions. For instance, the related papers of the PCA-based method have good results, but its drawback is that the PCA-based cannot handle missing values, leading to a great error. In addition, the use of statistical methods in doing SPC (Statistical Process Control) data clustering, you need a long-term cumulative data for each item in order to make a meaningful grouping and thus the training data.

In this study, we made use of the characteristics of the Beta distribution method to design attack detection. This method can solve the problem of missing values, besides, data clustering does not need to accumulate large amounts of data for some time and it can detect the products which is attacked. In addition, there are other in the past scholars are assuming that the attacker only attacks one target item in the user data, this study simulated lots of attackers attack multiple targets in the experiment. Beta distribution method for the Detection rate is over 70%, the False alarm rate is between 10% to 20%.
關鍵字(中) ★ 推薦系統
★ 攻擊模型
★ 偵測攻擊
★ Beta分配
關鍵字(英)
論文目次 目錄
中文摘要 i
目錄 ii
圖目錄 iv
表目錄 v
第一章、緒論 1
1-1 研究背景 1
1-2 研究動機 2
1-3 研究目的 4
1-4 研究架構 4
第二章、文獻探討 6
2-1 推薦系統 6
2-2-1 推薦系統之定義與特性 6
2-2-2 推薦系統的分類 6
2-2 攻擊模型 14
2-3 偵測攻擊 20
2-3-1 統計學的技術 20
2-3-2 非監督的群集方法 20
2-3-3 監督式的分類分析法 21
2-3-4 主成分分析為基礎的方法 21
2-4 Beta分配 22
2-4-1 數學定義 22
2-4-2 關於Beta函數β 23
2-4-3 Beta的要素 23
第三章、研究方法 25
3-1 問題描述 25
3-2 Beta分配的運用 26
3-3 建構全體資料的期望值 28
3-4 偵測疑似異常的項目資料 29
3-5 偵測異常的項目 32
第四章、實驗的模擬 33
4-1 資料描述 33
4-2 注入的攻擊模型 33
4-3 模擬設計 34
4-4 模擬結果 35
4-4-1 區隔攻擊模型之模擬結果 35
4-4-2 六種攻擊模型之模擬結果 38
4-4-3區隔攻擊模型之穩定度 40
第五章、結論 41
5.1 研究貢獻 41
5.2 研究限制 41
5.3 未來研究方向 41
參考文獻 43
英文部分 43
中文部分 48

圖目錄
圖2-1推薦系統組成架構 8
圖2-2購買行為模式矩陣 8
圖2-3 線性組合的架構圖 13
圖2-4 循序組合架構圖 13
圖2-5 一般的攻擊資料的形式 15
圖3-1 Beta機率密度函數的圖形 27
圖4-1 偵測率與錯殺率和攻擊者的數量之關係 36
圖4-2 偵測率與錯殺率和被攻擊的項目數量之關係 36
圖4-3 偵測率與錯殺率和被選擇的項目數量之關係 37
圖4-4 偵測率與錯殺率和填充項目數量之關係 37
圖4-5 六種攻擊模型與攻擊者的數量之偵測率關係 38
圖4-6 六種攻擊模型與攻擊者的數量之錯殺率關係 39
圖4-7區隔攻擊模型之模擬次數結果 40

參考文獻 英文部分:
1. Al Mamunur Rashid, “Getting to know you: Learning New User Preferences in Recommender Systems”, Proceeding sof the 7th international conference on Intelligent user interfaces, 2002.
2. B. Burke, B. Mobasher, C. Williams, R. Bhaumik, Classification Features for Attack Detection in Collaborative Recommender Systems, KDD ′06 Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 2006.
3. B.Sarwar, G. Karypis, J. Konstan, and J. Riedl, “Analysis of Recommendation Algorithms for E-Commerce,” in Proceedings of the ACM E-Commerce 2000 Conference, pp. 158-167, 2000.
4. Bhaumik R, Burke RD, Mobasher B, Crawling attacks against web-based recommender systems. In: Proceedings of the international conference on data mining, Las Vegas, NV, USA, pp 183–189, 2007.
5. Bhaumik R, Williams CA, Mobasher B, Burke RD, Securing collaborative filtering against malicious attacks through anomaly detection. In: Proceedings of the 4th workshop on intelligent techniques for web personalization, Boston, MA 65, 2006.
6. Burke RD, Mobasher B, Bhaumik R, Limited knowledge shilling attacks in collaborative filtering systems. In: Proceedings of workshop on intelligent techniques for web personalization, Edinburgh, UK, 2005.
7. Burke RD, Mobasher B, Bhaumik R, Williams CA, Segment-based injection attacks against collaborative filtering recommender systems. In: Proceedings of the 5th IEEE international conference on data mining, Houston, TX, USA, pp 577–580, 2005.
8. Burke RD, Mobasher B, Bhaumik R, Williams CA, Collaborative recommendation vulnerability to focused bias injection attacks. In: Proceedings of the Workshop on privacy and security aspects of data mining, Houston, TX, USA, pp 35–43, 2005.
9. Burke RD, Mobasher B, Zabicki R, Bhaumik R, Identifying attack models for secure recommendation. In: Proceedings of the Web KDD workshop on the next generation of recommender systems research, San Diego, CA, USA, pp 19–25, 2005.
10. Burke RD, MobasherB, Williams CA, Bhaumik R, Classification features for attack detection in collaborative recommender systems. In: Proceedings of the 12th ACM SIGKDD international conference eon knowledge discovery and data mining, Philadelphia, PA, USA, pp 542–547, 2006.
11. Burke RD, MobasherB, Williams CA, Bhaumik R, Detecting profile injection attacks in collaborative recommender systems. In: Proceedings of the 8th IEEE conference on e-commerce technology, San Francisco, CA, USA, pp 23–30, 2006.
12. Burke RD, O’Mahony MP, Hurley NJ, Robust collaborative recommendation. In: Ricci F, RokachL, Shapira B, Kantor PB (eds) Recommender systems handbook. Springer, New York, pp 805–835, 2011.
13. Cheng Z, Hurley NJ, Robust collaborative recommendation by least trimmed squares matrix factorization. In: Proceedings of the 22nd IEEE international conference on tools with artificial intelligence, Arras, France, pp 105–112, 2010.
14. Chirita PA, NejdlW, Zamfir C, Preventing shilling attacks in online recommender systems. In: Proceeding sof the 7th annual ACM international workshop on web information and data management, Bremen, Germany, pp 67–74, 2005.
15. Chung, Chen Yao, Dissertation _βP_ A Novel Approach to Filter out Malicious Rating Profiles from Recommender Systems, 2013.
16. G. Salton and MJ McGill, “Introduction to Modern Information Retrieval, ”McGraw-Hill, New York, 1983
17. GroupLens Lab, MovieLens Data Set, http://www.grouplens.org/node/12 2010.
18. Hurley NJ, O’Mahony MP, Silvestre GCM, Attacking recommender systems: a cost-benefit analysis.IEEE IntellSyst 22(3):64–68, 2007.
19. IhsanGunes ,CihanKaleli , Alper Bilge , Huseyin Polat, Shilling attacks against recommender systems a comprehensive survey-1, 2012.
20. J. Ben Schafer, Dan Frankowski, Jon Herlocker, and ShiladSen, Collaborative Filtering Recommender Systems, 2007.
21. J. Delgado, N. Ishii, and T. Ura., “Content-based collaborative information filtering: Actively learning to classify and recommend documents,” in Proc. Second Int. Workshop, CIA’98, pp. 206-215, 1998.
22. J.Ben Schafer, “Recommender Systems in E-Commerce”, E-Commerce of the ACM, 1999.
23. Lam SK, Riedl JT, Shilling recommender systems for fun and profit. In: Proceedings of the 13thinternational conference on world wide web, New York, NY, USA, pp 393–402, 2004.
24. M. Balabanovic and Y. Shoham, “Fab: Content-based, collaborative recommendation,” Communications of the ACM, Vol. 40, No. 3, pp. 66-72, 1997.
25. M. Claypool, A. Gokhale, T. Miranda, P. Murnikov, D. netes, and M. Sartin, “Combining content-based and collaborative filters in an online newspaper,” in Proc. ACM-SIGIR Workshop on Recommender Systems: Algorithms and Evaluation, 1999.
26. M.J. Pazzani , “A Framework For Collaborative, Content-Based and Demographic Filtering,” Artificial Intelligence Review, Vol. 13,No. 5-6 , pp.393-408, 1999.
27. Mehta B, Unsupervised shilling detection for collaborative filtering. In: Proceedings of the 22nd internationalconference on artificial intelligence, Vancouver, BC, Canada, pp 1402–1407, 2007.
28. Mehta B, Hofmann T, Nejdl W, Lies and propaganda: Detecting spam users in collaborative filtering.In: Proceedings of the 12th international conference on intelligent user interfaces, Honolulu, HI, USA,pp 14–21, 2007.
29. Mehta B, Nejdl W, Unsupervised strategies for shilling detection and robust collaborative filtering. User Model User Adapt Interact 19(1-2):65–97, 2009.
30. Mobasher B, Burke RD, Bhaumik R, Sandvig JJ, Attacks and remedies in collaborative recommendation.I EEE IntellSyst 22(3):56–63, 2007.
31. Mobasher B, Burke RD, Bhaumik R, Williams CA, Towards trustworthy recommender systems: ananalysis of attack models and algorithm robustness. ACM Trans Internet Technol 7(4):23–60, 2007.
32. Mobasher B, Burke RD, Bhaumik R, Williams CA, Towards trustworthy recommender systems: ananalysis of attack models and algorithm robustness. ACM Trans Internet Technol 7(4):23–60, 2007.
33. O’Mahony MP, Hurley NJ, Silvestre GCM, Recommender systems: Attack types and strategies. In: Proceedings of the 20th national conference on artificial intelligence, Pittsburgh, PA, USA, pp 334–339, 2005.
34. O’Mahony MP, Hurley NJ, Silvestre GCM, Attacking recommender systems: The cost of promotion. In: Proceedings of the workshop on recommender systems, in conjunction with the 17th European conference on artificial intelligence, Riva del Garda, Trentino, Italy, pp 24–28, 2006.
35. O’MahonyMP, Hurley NJ, Silvestre GCM, Collaborative filtering-safe and sound.Lect Notes ComputSci 2871:506–510, 2003.
36. P. Melville, Raymond J. Mooney ,andRamadass Nagarajan, “Content-Boosted Collaborative Filtering,” ACM GIR-2001 Workshop on Recommender Systems, New Orleans, L.A, 2001.
37. P. Resnick, N. Iacovou, M. Suchak, P. Bergstorm, and J. Riedl,“Grouplens: An open architecture for collaborative filtering of netnews,” in Proc. ACM Conf. On Computing Systems, pp.210-217, 1995.
38. Paul Johnson, Matt Beverlin, Beta Distribution, 2013.
39. Q. Li and B. M. Kim, “Clustering Approach for Hybrid Recommender System,” in Proc. of the IEEE/WIC InternationalConference on Web Intelligence, pp.33-38, 2003.
40. Ray S, Mahanti A, Strategies for effective shilling attacks against recommender systems. LectNotesComputSci 5456:111–125, 2009.
41. RunaBhaumik, Chad Williams, Bamshad Mobasher, Robin Burke, Securing Collaborative Filtering Against Malicious Attacks Through Anomaly Detection, 2006.
42. Sandvig JJ, Mobasher B, Burke RD, Robustness of collaborative recommendation based on association rule mining. In: Proceedings of the 1st ACM conference on recommender systems, Minneapolis, MN,USA, pp 105–112, 2007.
43. U. Shardanand, and P. Maes, “Social Information Filtering: Algorithms for Automating ‘Word of Mouth’,” in Proceedings ofthe Conference on Human Factors in Computing Systems (CHI95), pp. 210-217, 1995.
44. Yi-Fan Wang, Yu-Liang Chuang, Mei-Hua Hsu ,and Huan-Chao Keh, “A Personalized Recommender System for the Cosmetic Business,” Expert Systems with Applications , Vol. 26, No. 3,pp.427-434, 2004.
45. Zhang FG, Reverse bandwagon profile injection attack against recommender systems. In: Proceedingsof the 2nd international symposium on computational intelligence and design, Changsha, China, pp15–18, 2009.
中文部分:
46. 張哲銘,以使用者偏好分類為基礎之網際資源推薦系統,碩士論文,國立台灣大學資訊管理研究所,2003
47. 黃信傑,以協同過濾輔助內容分析之文件推薦系統,碩士論文,國立中山大學資訊管理研究所,2006
48. 曾薇蓉,刪除協同推薦系統中偏誤評估者之研究,碩士論文,國立中央大學企業管理研究所,2006
49. 羅健銘,協同過濾於網站推薦之研究,碩士論文,國立台北科技大學商業自動化與管理研究所,2001
50. 陳昭宇,根基於自我組織特徵映射圖為基礎最佳化演算法之推薦系統,碩士論文,國立中央大學資訊工程研究所,2005
51. 洪振富,距離式特徵於資料自動分類之研究,碩士論文,國立中央大學資訊管理學系碩士論文,2010
52. 黃鈁?,運用類神經網路預測新進顧客產品喜好之個人化商品推薦技術,碩士論文,朝陽科技大學資訊管理系,2005
53. 羅淑娟,劉德敏,網友推薦系統之研發與建置,國立台北科技大學工業工程與管理系,臺北科技大學學報第三十九之一期, 2005
54. 吳緯閔,網際網路服務推薦系統,碩士論文,國立中央大學資訊工程研究所,2008
指導教授 許秉瑜 審核日期 2014-6-11
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明