Anomaly Detection Against Shilling Attacks In E-Com Site

4,000.00

Categories: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Description

Anomaly Detection Against Shilling Attacks In E-Com Site

Various types of web applications have gained both higher customer satisfaction and morebenefits since being successfully armed with personalized recommendation. However, the increasingly rampant shilling attackers apply biased rating profiles to systems to manipulate item recommendations, which not just lower the recommending precision and user satisfaction but also damage the trustworthiness of intermediated transaction platforms and participants.

Many studies have offered methods against shilling attacks, especially user profile based-detection. However, this detection suffers from the extraction of the universal feature of attackers, which directly results in poor performance when facing the improved shilling attack types. Anomaly Detection Against Shilling Attacks In E-Com Site This paper presents a novel dynamic time interval segmentation technique based item anomaly detection approach to address these problems. In particular, this study is inspired by the common attack features from the standpoint of the item profile, and can detect attacks regardless of the specific attack types.

The proposed segmentation technique could confirm the size of the time interval dynamically to group as many consecutive attack ratings together as possible. In addition, apart from effectiveness metrics, little attention has been paid to the robustness of detection methods, which includes measuring both the accuracy and the stability of results. Hence, we introduced stability metric as a complement for estimating the robustness. Thorough experiments on the Movie Lens dataset illustrate the performance of the proposed approach, and justify the value of the proposed approach for online applications.

below video its a version of web u can get in android as well android based app projects for college students

Software Requirements: –

Front End: HTML5, CSS3, Bootstrap
Back End: PHP, MYSQL
Control End: Angular Java Script

Tools:
Android Emulator
xampp-win32-5.5.19-0-VC11
Android SDK – adt-bundle-windows-x86
IDE: Eclipse Mars
jdk-8u66-windows-i586

Reviews

There are no reviews yet.

Be the first to review “Anomaly Detection Against Shilling Attacks In E-Com Site”

Your email address will not be published.