DETECTION METHOD FOR SHORT-TERM SHILLING ATTACKS IN E-COMMERCE SYSTEMS USING ADAPTIVE GRANULARITY OF USER FEEDBACK

Authors

DOI:

https://doi.org/10.20998/2079-0023.2025.02.20

Keywords:

shilling attacks, e-commerce systems, temporal rules, adaptive granularity, sales variability, attack detection, recommender systems, outliers

Abstract

The subject of research is the process of detecting short-term shilling attacks in e-commerce systems based on analysis of temporal dependencies between explicit and implicit user feedback. The aim of the work is to develop an approach to detecting shilling attacks using temporal rules and adaptive granularity of both sales and ratings in e-commerce systems. Research tasks include: development of an approach to detecting short-term shilling attacks based on adaptive comparison of temporal rules for sales and ratings; development of a method for detecting short-term shilling attacks based on adaptive granularity of explicit and implicit user feedback. Explicit user feedback is represented by ratings, while implicit feedback is captured through product sales. The developed method includes the following stages: preliminary aggregation of sales data; analysis of sales and ratings variability through the ratio of standard deviation to mean value; identification of intervals with potential attack possibility; formation of a fact set with different granularity levels; construction of temporal rules of two types for sales and ratings; detection of shilling attack intervals based on comparison of rule weight signs for sales and ratings; identification of attacking users based on analysis of user activity across detected shilling attack intervals. The method provides automated selection of time granularity for determining sales facts and forming ratings and thereby improves the accuracy of detecting short-term attacks compared to fixed granularity, as well as enables attack detection in near-online mode. The practical significance of the obtained results lies in the possibility of detecting short-term rating distortions in e-commerce systems, social networks, and recommender systems to increase user trust in recommended products and services.

Author Biographies

Oksana Chala, Kharkiv National University of Radio Electronics

Doctor of Technical Sciences, Associate Professor, Head of the Department of Radio Engineering and Information-Communication Systems, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine

Oleksandr Bitchenko, Kharkiv National University of Radio Electronics

Candidate of Technical Sciences, Associate Professor, Associate Professor of the Department of Radio Engineering and Information-Communication Systems, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine

Liliia Saikivska, Kharkiv National University of Radio Electronics

Candidate of Technical Sciences, Associate Professor, Associate Professor of the Department of Radio Engineering and Information-Communication Systems, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine

Anzhelika Kalnitska, Kharkiv National University of Radio Electronics

Assistant of the Department of Information Control Systems, Kharkiv National University of Radio Electronics, Kharkiv, Ukraine

References

Zhou W., Wen J., Qu Q., Zeng J., Cheng T. Shilling attack detection for recommender systems based on credibility of group users and rating time series. PLOS ONE. 2018, vol. 13, no. 5, article e0196533. DOI: doi.org/10.1371/journal.pone.0196533.

Cai H., Huang J., Liu B. Detecting shilling attacks in recommender systems based on analysis of user rating behavior. Knowledge-Based Systems. 2019, vol. 177, pp. 22–43. DOI: doi.org/10.1016/j.knosys.2019.03.041.

Pote M., Elmas T., Flammini A., Menczer F. Coordinated reply attacks in influence operations: characterization and detection. Proc. of the Int. Conf. on Web and Social Media (ICWSM). 2025. arXiv:2410.19272. DOI: doi.org/10.1609/icwsm.v19i1.35889.

Zhou W., Wen J., Xiong Q., Gao M., Zeng J. SVM-TIA: a shilling attack detection method based on SVM and target item analysis in recommender systems. Neurocomputing. 2016, vol. 210, pp. 197–205. DOI: doi.org/10.1016/j.neucom.2016.01.197.

Shao C., Sun Y. Z. Shilling attack detection for collaborative recommender systems: a gradient boosting method. Mathematical Biosciences and Engineering. 2022, vol. 19, no. 7, pp. 7248–7271. DOI: doi.org/10.3934/mbe.2022342.

Hao Y., Zhang F. An unsupervised detection method for shilling attacks based on deep learning and community detection. Soft Computing. 2020, vol. 24, pp. 18677–18688. DOI: doi.org/10.1007/s00500-020-05162-6.

Zhang F., Zhou Q. Unsupervised approach for detecting shilling attacks in collaborative filtering recommender systems. IET Information Security. 2019, vol. 13, no. 6, pp. 625–634. DOI: doi.org/10.1049/iet-ifs.2018.5131.

Gunes I., Kaleli C., Bilge A., Polat H. Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review. 2014, vol. 42, no. 4, pp. 767–799. DOI: doi.org/10.1007/s10462-012-9364-9.

Chala O., Novikova L., Chernyshova L. Method for detecting shilling attacks in e-commerce systems using weighted temporal rules. EUREKA: Physics and Engineering. 2019, vol. 5, pp. 29–36. DOI: doi.org/10.21303/2461-4262.2019.00983.

Xu Y., Zhang F. Detecting shilling attacks in social recommender systems based on time series analysis and trust features. Knowledge-Based Systems. 2019, vol. 178, pp. 25–47. DOI: doi.org/10.1016/j.knosys.2019.04.035.

Yuan W., Guan D., Lee Y. K., Lee S. Detection of shilling attacks based on T-distribution on the dynamic time intervals. IEEE Access. 2019, vol. 7, pp. 121308–121319. DOI: doi.org/10.1109/ACCESS.2019.2937164.

Yang Z., Xu L., Cai Z. Re-scale AdaBoost for attack detection in collaborative filtering recommender systems. arXiv:1506.04584 [cs.IR]. 2015. DOI: doi.org/10.48550/arXiv.1506.04584.

Published

2025-12-29

How to Cite

Chala, O., Bitchenko, O., Saikivska, L., & Kalnitska, A. (2025). DETECTION METHOD FOR SHORT-TERM SHILLING ATTACKS IN E-COMMERCE SYSTEMS USING ADAPTIVE GRANULARITY OF USER FEEDBACK. Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information Technologies, (2 (14), 135–139. https://doi.org/10.20998/2079-0023.2025.02.20

Issue

Section

INFORMATION TECHNOLOGY