DETECTION METHOD FOR SHORT-TERM SHILLING ATTACKS IN E-COMMERCE SYSTEMS USING ADAPTIVE GRANULARITY OF USER FEEDBACK
DOI:
https://doi.org/10.20998/2079-0023.2025.02.20Keywords:
shilling attacks, e-commerce systems, temporal rules, adaptive granularity, sales variability, attack detection, recommender systems, outliersAbstract
The subject of research is the process of detecting short-term shilling attacks in e-commerce systems based on analysis of temporal dependencies between explicit and implicit user feedback. The aim of the work is to develop an approach to detecting shilling attacks using temporal rules and adaptive granularity of both sales and ratings in e-commerce systems. Research tasks include: development of an approach to detecting short-term shilling attacks based on adaptive comparison of temporal rules for sales and ratings; development of a method for detecting short-term shilling attacks based on adaptive granularity of explicit and implicit user feedback. Explicit user feedback is represented by ratings, while implicit feedback is captured through product sales. The developed method includes the following stages: preliminary aggregation of sales data; analysis of sales and ratings variability through the ratio of standard deviation to mean value; identification of intervals with potential attack possibility; formation of a fact set with different granularity levels; construction of temporal rules of two types for sales and ratings; detection of shilling attack intervals based on comparison of rule weight signs for sales and ratings; identification of attacking users based on analysis of user activity across detected shilling attack intervals. The method provides automated selection of time granularity for determining sales facts and forming ratings and thereby improves the accuracy of detecting short-term attacks compared to fixed granularity, as well as enables attack detection in near-online mode. The practical significance of the obtained results lies in the possibility of detecting short-term rating distortions in e-commerce systems, social networks, and recommender systems to increase user trust in recommended products and services.
References
Zhou W., Wen J., Qu Q., Zeng J., Cheng T. Shilling attack detection for recommender systems based on credibility of group users and rating time series. PLOS ONE. 2018, vol. 13, no. 5, article e0196533. DOI: doi.org/10.1371/journal.pone.0196533.
Cai H., Huang J., Liu B. Detecting shilling attacks in recommender systems based on analysis of user rating behavior. Knowledge-Based Systems. 2019, vol. 177, pp. 22–43. DOI: doi.org/10.1016/j.knosys.2019.03.041.
Pote M., Elmas T., Flammini A., Menczer F. Coordinated reply attacks in influence operations: characterization and detection. Proc. of the Int. Conf. on Web and Social Media (ICWSM). 2025. arXiv:2410.19272. DOI: doi.org/10.1609/icwsm.v19i1.35889.
Zhou W., Wen J., Xiong Q., Gao M., Zeng J. SVM-TIA: a shilling attack detection method based on SVM and target item analysis in recommender systems. Neurocomputing. 2016, vol. 210, pp. 197–205. DOI: doi.org/10.1016/j.neucom.2016.01.197.
Shao C., Sun Y. Z. Shilling attack detection for collaborative recommender systems: a gradient boosting method. Mathematical Biosciences and Engineering. 2022, vol. 19, no. 7, pp. 7248–7271. DOI: doi.org/10.3934/mbe.2022342.
Hao Y., Zhang F. An unsupervised detection method for shilling attacks based on deep learning and community detection. Soft Computing. 2020, vol. 24, pp. 18677–18688. DOI: doi.org/10.1007/s00500-020-05162-6.
Zhang F., Zhou Q. Unsupervised approach for detecting shilling attacks in collaborative filtering recommender systems. IET Information Security. 2019, vol. 13, no. 6, pp. 625–634. DOI: doi.org/10.1049/iet-ifs.2018.5131.
Gunes I., Kaleli C., Bilge A., Polat H. Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review. 2014, vol. 42, no. 4, pp. 767–799. DOI: doi.org/10.1007/s10462-012-9364-9.
Chala O., Novikova L., Chernyshova L. Method for detecting shilling attacks in e-commerce systems using weighted temporal rules. EUREKA: Physics and Engineering. 2019, vol. 5, pp. 29–36. DOI: doi.org/10.21303/2461-4262.2019.00983.
Xu Y., Zhang F. Detecting shilling attacks in social recommender systems based on time series analysis and trust features. Knowledge-Based Systems. 2019, vol. 178, pp. 25–47. DOI: doi.org/10.1016/j.knosys.2019.04.035.
Yuan W., Guan D., Lee Y. K., Lee S. Detection of shilling attacks based on T-distribution on the dynamic time intervals. IEEE Access. 2019, vol. 7, pp. 121308–121319. DOI: doi.org/10.1109/ACCESS.2019.2937164.
Yang Z., Xu L., Cai Z. Re-scale AdaBoost for attack detection in collaborative filtering recommender systems. arXiv:1506.04584 [cs.IR]. 2015. DOI: doi.org/10.48550/arXiv.1506.04584.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
