CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Data Mining based Approach to Detect Attacks in Information System Filtering

by Anshu Sharma, Shilpa Sharma, Chirag Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 16
Year of Publication: 2013
Authors: Anshu Sharma, Shilpa Sharma, Chirag Sharma
10.5120/10011-4908

Anshu Sharma, Shilpa Sharma, Chirag Sharma . A Data Mining based Approach to Detect Attacks in Information System Filtering. International Journal of Computer Applications. 61, 16 ( January 2013), 21-23. DOI=10.5120/10011-4908

@article{ 10.5120/10011-4908,
author = { Anshu Sharma, Shilpa Sharma, Chirag Sharma },
title = { A Data Mining based Approach to Detect Attacks in Information System Filtering },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 16 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number16/10011-4908/ },
doi = { 10.5120/10011-4908 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:09:36.797951+05:30
%A Anshu Sharma
%A Shilpa Sharma
%A Chirag Sharma
%T A Data Mining based Approach to Detect Attacks in Information System Filtering
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 16
%P 21-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Securing information system filtering from malicious attacks has become an important issue with increasing popularity of information system filtering. Data mining is the analysis of observational data sets to find unsuspected relationships and to summarize the data novel ways that are both understandable and useful to data owners. Information systems are entirely based on the input provided by users or customers, they tend to become highly prone to attacks. To prevent such attacks several mechanisms can be used. In this paper, we show that the unsupervised clustering one of the data mining technique can be used for attack detection for all types of attacks. This method is based on computing detection attributes modeled on basic descriptive statistics. Our study showed that attribute based unsupervised clustering algorithm can detect spam users with high degree of accuracy and fewer misclassified genuine users regardless of attack strategies.

References
  1. M. O'Mahony , N. Hurley, N. Kushmerick, and G. Silvestre, "Collaborative Recommendation: A Robust Analysis," ACM Transactions on Internet Technology, Vol 4, No. 4, pp-344-377, 2004.
  2. S. Lam and J. Reidl, "Shilling recommender systems for fun and profit," in Proceedings of the 13th International WWW Conference, New York, May 2004
  3. B. Mobasher, R. Burke, R. Bhaumik, and C. Williams, "Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness," ACM Transactions on Internet Technology(TOIT), Volume 7 , Issue 4 (October 2007), 2007.
  4. B. Mehta, "Unsupervised shilling detection for collaborative filtering,"AAAI, 1402-1407, 2007. Sannella.
  5. M. O. K. Bryan and P. Cunningham, "Unsupervised retrieval of attack profiles in collaborative recommender systems," in Technical Report, University College Dublin, 2008.
  6. N. Hurley, Z. Cheng, and M. Zhang, "Statistical attack detection," Proceedings of the third ACM conference on Recommender systems, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Data mining clustering information system filtering