logo

Investigating the effectiveness of profile injecting attack against recommender system

   

Added on  2021-06-17

11 Pages2236 Words293 Views
Running head: PROFILE INJECTING ATTACK AGAINST RECOMMENDER SYSTEMInvestigating the effectiveness of profile injecting attack against recommender systemName of the Student:Name of the University:Author note:

1PROFILE INJECTING ATTACK AGAINST RECOMMENDER SYSTEMTable of ContentsChapter 1: Introduction....................................................................................................................21.1 Background of the study............................................................................................................21.2 Aims of the study.......................................................................................................................21.3 Objectives of the study..............................................................................................................21.4 Research Questions....................................................................................................................21.5 Problem Statement.....................................................................................................................31.6 Rationale of the study................................................................................................................31.7 Structure of the study.................................................................................................................5Chapter 2: Literature review............................................................................................................62.1 Introduction................................................................................................................................62.2 Overview of the recommender system......................................................................................62.3 Analysis of profile injecting attack............................................................................................72.4 Effectiveness of profile injecting attack against recommender system.....................................72.5 Summary....................................................................................................................................8Chapter 3: Research methodology...................................................................................................93.1 Introduction................................................................................................................................93.2 Research philosophy..................................................................................................................93.3 Research approach.....................................................................................................................93.4 Research design.......................................................................................................................103.5 Data collection and analysis technique....................................................................................103.6 Summary..................................................................................................................................10References......................................................................................................................................11

2PROFILE INJECTING ATTACK AGAINST RECOMMENDER SYSTEMChapter 1: Introduction1.1 Background of the studyFrom starting of the web services on the internet has been expanding at rapid rate.However, retrieval of information is considered as a significant problem (Gunes et al. 2014). Arecommender system is known as a system suggesting items to different user where it might getinterest. It is necessary for people consulting with different individuals and asks regarding theirexperiences during making any selections. 1.2 Aims of the studyThe aim of the study will be analysing the effectiveness of profile injecting attack againstrecommender system such as Netflix, Amazon or any type of published recommender system. 1.3 Objectives of the studyTo critically analyse the effectiveness of profile injecting attack againstrecommender systemTo evaluate the process of profile injecting attackTo find out the challenges involved in the systemTo recommend specific solutions to overcome the issues 1.4 Research QuestionsHow profile-injecting attack against recommender system is effective?What is the process of profile injecting attack?What are the challenges involved in the system?What are the solutions for overcoming the issues?

3PROFILE INJECTING ATTACK AGAINST RECOMMENDER SYSTEM1.5 Problem StatementBurke, O’Mahony and Hurley (2015) stated that sseveral websites make attempt-helpingusers through incorporating a recommender system. In the other hand, content-based filteringsystem as well as collaborative filtering is generally applied for predicting the recommendations.Apart from this, collaborative filtering is considered as one of the most general approaches inorder to design e-commerce recommended system. However, the most of the robust systems arenot affected by the profile injection attacks. In addition, any type of collaborative systems is ableto do that. 1.6 Rationale of the studyE-commerce recommender systems are usually considered as vulnerable to distinctivetypes of profile-injection attacks where profiles of fake users are inserted into the system in orderto influence recommendation composed by the users. The attack-profiles are usually consideredas the outliers in the user rated dataset (Yang et al. 2016). It is difficult for designing a particularsystem, which cannot be attached. In the past, studying robust recommendations are studied torecognize as well as defeating attacks. In this perspective, it becomes important to analyse theeffectiveness of profile injecting attack against recommender systems.1.7 Structure of the studyThe study consists of introduction, literature review and research methodology.Introduction chapter consists of research aims, objectives and research questions. In addition,background, problem statement and research rationale are described in this chapter. On the otherhand, literature review includes overview of the concept, theories, models and impact. Thirdchapter, research methodology covers research philosophy, research approach and researchdesign.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ON THE EFFECTIVENESS OF SHILLING ATTACK OR PROFILE INJECTION
|86
|15661
|1

Investigating the effectiveness of profile injecting attack against recommender system
|7
|821
|226

Alignment between Management and Information Systems
|13
|2122
|125

Study of Cyber Security issues for e-commerce
|51
|15114
|99

Effectiveness of Shilling Attacks Against Recommender Systems
|9
|1885
|190

E-Commerce Security: Risks and Mitigation Measures
|81
|18103
|393