logo

Investigating the effectiveness of profile injecting attack against recommender system

   

Added on  2023-06-15

7 Pages821 Words226 Views
Running head: BUSINESS RESEARCH METHODS
Business Research Methods
University Name
Student Name
Authors’ Note

2
BUSINESS RESEARCH METHODS
Table of Contents
1.1 Background of the study......................................................................................................2
1.2 Statement of problem...........................................................................................................2
1.3 Aims and objectives.............................................................................................................2
1.4 Significance of the study......................................................................................................4
1.5The Design Scope.................................................................................................................4
2.0 Literature Review.................................................................................................................4
2.1 Attack Model........................................................................................................................4
2.3 Profile Classification............................................................................................................5
3.0 Organization of the design...................................................................................................5
References..................................................................................................................................7

3
BUSINESS RESEARCH METHODS
Investigating the effectiveness of profile injecting attack against recommender system
1.1 Background of the study
Collaborative recommender system is referred to as exceedingly susceptible to particularly
profile injection attacks; particularly these hits include inclusion of various predisposed
profiles into ratings of catalogue for altering the specific recommendation behaviour of the
scheme (Yang et al. 2017). Previous work was reflected at the time when profiles are mainly
reverse engineered for the maximizing the influence, yet a small amount of malevolent
outlines can considerably prejudice the entire arrangement.
1.2 Statement of problem
The recommender system becomes a tack of numerous sites for e-commerce, however
considerable susceptibilities are said to be existent in these kinds of systems when
encountered with what is known as “shilling attacks” (Yang et al. 2017). The current study
has the need to identify a specific approach for detection of profile injection attacks with
monitored cataloguing.
1.3 Aims as well as objectives
The current study aims to check up and analyses effectiveness of profile injecting attack
against recommender system. The study also intends to examine various vulnerabilities of
different recommendation techniques. In addition to this, this study also aims to recognize
diverse models of attack, founded on different suppositions regarding knowledge of the
attacker as well as intent.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Investigating the effectiveness of profile injecting attack against recommender system
|11
|2236
|293

ON THE EFFECTIVENESS OF SHILLING ATTACK OR PROFILE INJECTION
|86
|15661
|1

Movie Recommender Systems: Collaborative Filtering, Content-based Filtering, and Hybrid Methods
|2
|659
|317

Business Research Method University Name Student Name Authors Note
|12
|2758
|38

Flooding attack Detection using Anomaly Techniques with Wireshark
|53
|13458
|342

Bluetooth Security
|14
|3034
|61