DocumentCode :
2209496
Title :
Using gaming strategies for attacker and defender in recommender systems
Author :
Zhan, Justin ; Thomas, Lijo ; Pasumarthi, Venkata
Author_Institution :
North Carolina A&T State Univ., Greensboro, NC, USA
fYear :
2011
fDate :
11-15 April 2011
Firstpage :
80
Lastpage :
87
Abstract :
Ratings are the prominent factors to decide the fate of any product in the present Internet Market and many people follow the ratings in a genuine sense. Unfortunately, the Sibyl attacks can affect the credibility of the genuine product. Influence limiter algorithms in recommender systems have been used extensively to overcome the Sibyl attacks but the effort could not reach the safe mark. This paper highlights an approach to generating gaming strategies for the attacker and defender in a recommender system. In a given recommender system environment, attackers and defenders play the most crucial part in a gaming strategy. A sequence of decision rules that an attacker or defender may use to achieve their desired goal is represented in these strategies involved in the game theory. The valid approaches to avoid the Sibyl attacks from the attackers are efficiently defended by the defenders. In our approach, we define attack graphs, use cases, and misuses cases in our gaming framework to analyze the vulnerabilities and security measures incorporated in a recommender system.
Keywords :
decision theory; game theory; information filtering; security of data; Internet market; Sibyl attacks; attack graphs; attacker; decision rules; defender; game theory; gaming strategies; influence limiter algorithms; misuses cases; recommender systems; use cases; Algorithm design and analysis; Collaboration; Game theory; Games; Recommender systems; Social network services; Attacker; Defender; Game Theory; Gaming Strategy; Recommender System; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Data Mining (CIDM), 2011 IEEE Symposium on
Conference_Location :
Paris
Print_ISBN :
978-1-4244-9926-7
Type :
conf
DOI :
10.1109/CIDM.2011.5949304
Filename :
5949304
Link To Document :
بازگشت