Abstract
Keywords
Introduction
With the continuous development of Internet technology, especially the explosive growth of news, commodities and entertainment resources, people face serious information overload when turning to the Internet to search for the items they need.1,2 In order to provide users with information quickly and accurately, recommender system is widely used in various fields. Traditional recommendation methods mainly include collaborative filtering, 3 content-based recommendation method,4,5 and hybrid recommendation method.6,7 With the development of social network, the social recommender system based on user social network is widely used in news, business, and other recommendation fields.8,9 To integrate social relations into the traditional recommender system can effectively improve the accuracy of the recommender system and alleviate the cold start problem of the recommender system. The development of Internet greatly facilitates people’s life, but it also brings security problems. For example, the wireless body area network (WBAN) network is subject to major security and privacy threats, especially data collected in medical or healthcare applications. 10 Due to the openness of the recommender system, the user can inject false scores and false social relationships into the system. Among them, the relationship shilling attacker changes the real user’s social relationships by establishing a large number of false relationships with other users, thus affecting the choice of real users, and the attackers will also spread the impact of the false relationships through the social network. 11 There are two kinds of attacks: push attack affects the recommendation frequency by increasing the target items, while nuke attack achieves the purpose by reducing the target items. 12 In order to improve the efficiency of stores, many businesses hire people to click farms to improve store scores and optimize commodity reviews. In 2001, Sony Pictures forged movie reviews in order to recommend newly released movies to users. These practices not only infringe on the interests of consumers, but also reduce the trust of all participants in the system over time.
In order to protect the security of recommendation network, shilling attack has been widely concerned by scholars since its emergence. 13 At present, shilling attack detection methods can be divided into supervised, 14 unsupervised,15,16 and semi-supervised.17–19 Supervised detection methods classify models by extracting various characteristics of users in social networks for training. 20 Unsupervised detection methods mainly identify the abnormal points in the network by utilizing the topological relationship of social network combined with clustering method. 21 Semi-supervised detection methods use both labeled data and unlabeled data to classify user data. 22
The existing research on the shilling attack detection has achieved some results, but less attention is paid to user’s implicit social attributes, the dynamic changes of social relationships, and the information utilization of data is not comprehensive enough. This article proposes a security detection method based on autonomy-oriented user sensor (AOUSD). By establishing models for the individual user, user relationship, and user propagation in social recommendation network, the detection of user relationship attack is realized. This method simulates each user as a social sensor. A social sensor refers to an entity with the basic characteristics of autonomy, sociality, reactivity, and pre-action. According to the characteristics of social sensors, users in the recommendation network are modeled from the perspectives of activity, feedback, influence, and adaptability. The social relationships will change due to the autonomy attribute of the user sensors. Users can perceive the recommendation environment and give information feedback to the environment, which dynamically affects the surrounding environment. Then user relationships are modeled from the perspective of convergence, stability, and directionality. The influence of social sensors has the characteristics of timeliness and dynamics. After modeling user individual and user relationship, we study user information communication mode from the perspective of time interval, emergency, and attack influence.
Through the modeling of user individual, user relationship and user communication mode, the user relationship graph is established. Then, the factors which affect the user relationship, such as time and events, are added to form a dynamic user knowledge graph. The user group is classified by hierarchical clustering to obtain the preliminary suspicious candidate group. Finally, using the clustering method of graph community detection, the candidate groups are classified, and the results of shilling attack detection are obtained.
The main contributions of this article include the following: (1) users are defined as social sensors, and the definitions of user relationship and user interaction are more accurate and specific to simulate the social recommendation environment; (2) a dynamic knowledge graph model is proposed, which considers the impact of time and false user injection on the recommender system,making the detection algorithm more comprehensive and flexible; (3) hierarchical clustering and graph community detection methods are used to classify the graph structure data generated by dynamic knowledge graph, which improve the detection accuracy and reduce the damage of shilling attack.
The rest of this article is organized as follows: section “Related work” introduces the related research of dynamic knowledge graph and shilling attack detection. Section “Attack detection method based on dynamic knowledge graph” describes the proposed AOUSD in detail. In section “Experiment and analysis,” the experiment is conducted and the experimental results are analyzed to compare the effects of different detection models. Section “Conclusion and future work” summarizes the research of this article and introduces the future work.
Related work
This part summarizes the relevant literature of relational shilling attack detection, social sensors, dynamic knowledge graph, and graph community detection. The problems existing in the research of relational shilling attack detection are given in this section, as well as the motivation of this article.
Shilling attack detection
Shilling attack seriously affect the recommendation quality of the system. The relationship shilling attack model is specifically targeted at social networks. This type of attack mainly forges social information for the social network itself, thereby it is able to threaten the core business of the social network. 23 Therefore, how to protect the recommender system from being affected by shilling attack has become a research hotspot in the field of recommendation network security.
There are many existing detection methods for relational attack detection. For example, Tan et al. 24 designed an unsupervised spam detection scheme called UNIK (a new UN-supervised socIal networK spam detection scheme). This method is designed to defend against Sybil attacks. The author also points out that spammers cannot participate in social networks because it is difficult for spammers to persuade non-spammers to become their friends. However, this method is difficult to detect shilling attackers when the scope of private social networks and relational networks are small, and this method is more suitable for group and large-scale relational attacks. Ying et al. 25 aimed to use the user relationship network formed by users of social networks to detect spam link attacks in social networks. This document uses the formation of abnormal user relationships to locate spam link attacks that occur in social networks. Zhongming et al. 26 proposed an algorithm for locating large-scale e-commerce online supporters based on the user diagram model. However, this algorithm shows limited accuracy and efficiency.
The existing shilling attack detection methods rarely consider the dynamic changes of the users, the user relationship, and the relationship between users and environment. The utilization of information is not comprehensive enough. This article considers users as social sensors. Due to the characteristics of their own attributes and social attributes, the user relationships will change during social interaction, and it can dynamically make corresponding feedback to the surrounding environment. At the same time, users show autonomy, which means users can spontaneously exclude false users and do not have social activities with false users. After the influence ability of false users in relationship attack disappears, they can no longer affect the surrounding environment. Taking advantage of the huge difference between the influence ability of shilling attackers and real users, the accuracy and efficiency of shilling attack detection can be hopefully improved.
Social sensors
From the perspective of human identity as the perceiver of nature and society, social sensor regards human as a special intelligent sensor and studies the role of human as an agent in the network era. In 2004, Wang Fei-Yue 27 proposed to carry out social computing research for network society, and put forward the idea and concept of social sensor network. As sensors, human individuals can move independently in the social and natural environment, and can perceive, interpret, integrate, and feedback information. Moreover, human groups can organize and spontaneously carry out social activities to achieve a certain balance and realize the self-organization of agents.
In 2009, Wagner and others 28 put forward the view of Human as Sensor, billions of human beings constitute a huge sensor network, which can perceive and express all aspects of social activities according to their prior knowledge and expressive ability. N Jabeur et al. 29 proposed volunteered geographic information (VGI) is the result of activities where individuals, supported by enabling technologies, behave like physical sensors by harvesting and organizing georeferenced content, usually in their surroundings. The score of a user depends on activities and feedbacks made by peers on any of the user’s versions. 29 Sahoh and Choksuriwong 30 proposed an emergency event management model using Bayesian Belief Networks. The model is based on social sensors and domain expert knowledge. The model utilizes social sensors to uncover posterior knowledge from uncertain emergency events, and deep event understanding using Who, What, Where, When, Why, and How (5W1H). 30
Most of the existing applications based on social sensors are used to address the network security problems of emergencies in social media, predict information, and establish social graph considering the behavior characteristics of users. However, this concept is rarely used in the field of shilling attack detection, and the application of dynamic knowledge graph to the description of social sensors has not been proposed. This article takes users as social sensors and builds a dynamic knowledge graph of user relationship network, and applies it on shilling attack detection. Social sensor’s communication ability, perception ability of natural environment, and the autonomy ability are fully studied.
Dynamic knowledge graph
The knowledge graph aims to describe various entities or concepts existing in the real world and the relationship between them.31,32 A knowledge graph is a relational network that connects all kinds of information together, such as social networks. Because this relationship network changes over time, the relationship between entities and entities continues to change, in order to fully acquire knowledge, Jiang et al. 33 first proposed a dynamic knowledge graph, adding a time dimension to the knowledge graph data, using time series analysis technology and graph similarity technology to analyze the change and trend of the graph structure over time, so as to grasp the key information. Jiang et al. 33 found that the knowledge graph is time-sensitive and proposed a t-TransE model based on it.
Dasgupta et al. 34 proposed HyTE model, which directly integrates time information in the process of knowledge graph representation. Xiaoli 35 proposed a time interval aware dynamic knowledge graph representation method TDG2E Timespan-aware Dynamic knowledge Graph Embedding Evolution (TDG2E). This method cuts the dynamic knowledge graph into different static subknowledge graphs according to the time node, and then uses Gated Recurrent Unit (GRU) to process each static subknowledge graph to capture the dependency relationship, so as to model the structural evolution process of the dynamic knowledge graph.
Most of the existing knowledge graph representation methods are suitable for static knowledge graph, while dynamic knowledge graph contains time information. Most of the existing dynamic knowledge graph representation methods only consider the time information on the basis of static methods, but ignore the sudden and uncertainty in the process of event evolution and information reproduction and dissemination. The time window is usually flexible and changeable. Social sensors are autonomous, social, reactive, and proactive. They can feed back information in real-time in a social environment, and the relationship between people is constantly changing. The static knowledge graph can intuitively describe the relationship between users, but it cannot reflect the nature of social sensors, and the short-term dynamic relationship changes caused by reproduction and communication ability cannot be described.
In this article, a dynamic knowledge graph is proposed, which considers a dynamic sliding window related to the factors of time and events; thus, it can better describe the changes of social sensors in social activities, and the false relationships with the attacker attackers make a huge difference, and it can detect the attackers more accurately.
This article proposes a security detection method based on AOUSD in social recommendation networks. Users are modeled as social sensors to study the interpretability of their ability to information transmission and propagation. Considering the impact on user relationships over time and the occurrence of events, a flexible and dynamic knowledge graph is constructed. Through the autonomous behaviors of user social sensors, we build user dynamic knowledge graph, and the attackers can be easily detected and excluded by graph community detection.
Attack detection method based on dynamic knowledge graph
In order to make full use of users’ behavior characteristics and accurately describe the propagation of user relations in social recommender system, and further improve the accuracy of shilling attack detection, a shilling attack detection model based on dynamic knowledge graph is proposed.
The overall framework of the proposed AOUSD is shown in Figure 1, which is divided into two steps: (1) input external data, pre-process the data, and establish the user relationship knowledge graph. In which, the data is stored in the form of graph, and the graph data is generated according to the user preference and the relationship function between users. Considering the dynamic change of user relationship and propagation over time and events, a dynamic knowledge graph is constructed. (2) through the characteristics of the disappearance of the communication ability of the shilling attackers and the shilling attackers’ inability to participate in social activities, hierarchical clustering is carried out to generate suspicious candidate groups. By using the clustering method of graph community detection, the suspicious candidate groups processed by the dynamic knowledge graph are classified to obtain different user groups, screen out the shilling attackers.

Attack detection framework of AOUSD.
Social sensor-based user model
Social sensors can carry out data acquisition, data processing, and data feedback. Social sensors have the characteristics of autonomy, flexibility, and cooperation ability, and they show the ability of group cooperation to form a social sensor network. Social sensors and the environment present a two-way communication, which not only perceive environmental information, but also output information to the environment.
Due to the characteristics of social sensors, real users can respond to emergencies. Shilling attackers will have a certain impact on real users when injecting, and have a strong ability to reproduce and spread in a short time. However, shilling attackers do not have the nature of social sensors. After the communication power disappears, the behavior curve of attackers almost returns to zero and cannot carry out social activities. At the same time, according to the reality of a social system discussed by Wang et al., 36 individuals with high credit will not easily imitate the behavior of individuals with low credit, that is, real users will not socialize with false users for a long time. In the real social process, some users have simple social relations, weak response to emergencies and small changes in behavior curve, which can be called “zombie users.” The behavior line diagram of three types of users is shown in Figure 2. The red line represents the influence propagation curve of shilling attackers, the blue line represents the behavior representation of real users, and the green line represents the behavior representation of zombie users. When the shilling attackers inject and emergencies occur, the real users react strongly and carry out active social activities, while the response of zombie users are relatively gentle. After the influence of the shilling attackers disappears, the shilling attackers cannot respond to emergencies, and the behavior curve approaches zero. At this time, the behavior curve of the shilling attackers is similar to that of zombie users. In the hierarchical clustering to dynamic knowledge graph, it may be uniformly classified into suspicious candidate groups.

Three types of user behavior.
During the classification of suspicious candidate groups, the attackers can give high and concentrated scores for specific targets, and will not give feedback in case of emergencies. History browsing and comment fields are relatively narrow, and browsing time is concentrated, which can be distinguished from zombie users.
The communication diagram of social sensor is shown in Figure 3. The innermost users are first affected by emergencies or their preference behavior changes. First, the user relationship changes with the relevant users in circle F1, and then the users in circle F2 generate information feedback. However, the influence of F2 is obviously much weaker than that of F1. The change in F3 is minimal. Due to the existence of real-time feedback ability of social sensors, although the influence will become weaker, its relationship will change immediately in case of emergencies. The relationship between the shilling attackers and other users in the social network is falsely established, and it will have an impact on the users who establish the false relationship and achieve the purpose of the attack. However, in a short time, this impact will weaken or even disappear. In case of an emergency, the false user will not change accordingly, and the weight of the false relationship with the real user is always at the set value and will not change immediately. Moreover, due to the autonomy of social sensors, they will restore their self-judgment ability in a certain time after they are affected. That is, after the influence ability of the shilling attackers disappears, the communication ability will not be generated again without injecting new relationships, and it will not be affected by other social sensors. This is the most important basis to our proposed detection method.

Propagation of social sensors.
The users in the social recommendation network are defined as social sensors. Because each user is an independent individual with different personal preferences and different views on events, hence, users present great heterogeneity in social environment. To better describe the user social sensors, the definitions of user attribute, user relationship, and user relationship propagation are given as follows.
Definition 1: user node
The user is represented by
where
where,
Among them, individual attributes are obtained by users filling in information. Because users have doubts about the security of network information and refuse to fill in information, it will cause incomplete information acquisition, so the acquisition of social attributes is particularly important. The parameters of social attributes can be obtained through the user’s browsing history, the number of comments, and attention. The measurement of activity is realized through the user’s access to the project, browsing records, number of comments, number of clicks, and so on. The measurement indicators of feedback include the user’s response to social events (being asked, being concerned, etc.), the immediate attention to new projects, the user’s output information about the surrounding environment, and so on. The measurement of influence is measured by the convergence of other users to this user. Weak convergence includes the number of comments and follow-up degree of other users to this user, and strong convergence includes the proportion of other users taking the same social behavior as this user, such as buying the same goods, forwarding the same comments, and following the same users. The measurement of adaptability is realized by the length of time users accept emergencies. Generally, the behavior curve of users tends to be a smooth straight line. When emergencies occur, the behavior curve is abnormal, and the smooth length of time reflects the adaptability of users. Adaptability also shows the interaction ability of social sensors to the environment. Users and the surrounding environment affect, change, and adapt to each other.
The performance of social sensors is reflected in daily social interactions. For example, when a breaking news event occurs, a user
Definition 2: user personal preference function
User historical visit items are described as
User history access list.
where
In the social environment, user relationship is a complex network structure, rather than the simple false user relationship established by the attackers when injecting. Therefore, it is necessary to establish a weighted knowledge graph structure by calculating the user relationship description function. The weight here is obtained by function calculation considering the above factors. In the triple relationship of knowledge graph, the weight of each edge represents the closeness of the relationship between users.
Social sensors-based user relationship
Social sensors can interact with data, information, and behavior. In this article, users in social networks are simulated as social sensors, and the relationship between them is modeled to form a knowledge graph relationship network with weight function.
In the recommender system, the user community will change due to emergencies and other factors. For example, user

Weight changes of the knowledge graph.
During injection, the shilling attackers sometimes inject the user profile and sometimes falsely construct the user relationship. However, due to the fact that the false users do not have the nature of social sensors, the user relationship weight function will not change and will only maintain the set value at the time of injection, the propagation force will disappear in a short time and will no longer make a two-way response to the environment.
Definition 3: short-term static relation function
Define the user relationship weight function that changes due to factors such as emergencies and time as
where
Specifically
The degree of relevance is the closeness of the relationship between users, such as leaving messages, comments, and following each other, and discussing when emergencies occur. It is believed that the degree of relevance between this user group is relatively high. Credibility is a form of user influence. Wang et al.
36
proposed an evolutionary game model to encourage cooperation between nodes, which effectively combines the credit-based incentive method with the evolutionary game model. Experiments show that the larger the credit function, the lower the success rate of abnormal nodes in transmitting information.
36
In this article, trust function is used to detect shilling attack. Similarity is the degree of similarity in behaviors such as preferences among users. According to research, the similarity between good friends is relatively high, their preferences are similar, and their responses to emergencies are similar. Influence is the user’s ability to influence when the time is
The relevance, credibility, similarity, and influence of users will change with the change of events and time. With the development of microblog and other online communication platforms, the influence of network public opinion is becoming greater and greater. Social sensors will not only change the feedback information when events occur, but also change preferences over time. Therefore, a variable time window is added to this detection method to make the use of database information more comprehensive and reliable, and the accuracy of the results is guaranteed.
Definition 4: dynamic relation function
For any user
The value of
Definition 5: N -hop relationship tightness
The closeness of the relationship between the target user and the first hop user is defined as the one-hop proximity
where
It represents the closeness of the relationship between user
When describing the attributes of the user and the user relationship function, the amount of calculation can be reduced according to the definition of the hop count. When the hop count of the
Dynamic knowledge graph
After shilling attackers enter the social network, they will establish false relationships to attack the recommender system. But the shilling attackers do not have the nature of the social sensor, and they are unable to participate in complex social activities. Hence, their influence propagation will disappear in a short time, and they will not respond to emergencies. The user relationship function value of attackers is artificially injected and it is a fixed value. As shown in Figure 5, the red users are shilling attackers, and the relationships established with the users are artificially set. Since the behaviors of zombie users and attackers show similarity after the spreading power disappears, they will be unified into the suspicious candidate group in the process of knowledge graph.

False user relationship graph.
Under normal circumstances, the knowledge graph
The time sliding window
Graph community detection model
Due to the similarity between zombie users and shilling attackers, it often leads to high false detection and missed detection, which affects the detection accuracy. In this article, the suspicious user candidate group is subdivided by graph community detection, and the shilling attack group and zombie user group are clustered. Graph community detection is a graph-based clustering method. 37 Graph clustering is an unsupervised learning process of graph structure classification. It groups the relatively closely connected nodes and their related edges in the graph to form a subgraph that can be represented by abstract nodes. 38
In the graph community, there are vertices and edges. A graph is usually denoted as
where
According to equation (23), if users
After the dynamic knowledge graph detects the data, the users are hierarchically clustered, the Euclidean distance is calculated according to the personal preference

Graph group clustering.
AOUSD algorithm description
According to the definition of social sensor attributes and user weight function, an algorithm of shilling attack detection method based on dynamic knowledge graph is proposed, including dynamic knowledge graph and graph community detection.
Dynamic knowledge graph algorithm
Algorithm 1 is mainly composed of three parts. The first part (lines 1–2) extracts the characteristics of database user relationships. The second part (lines 3–13) constructs time and event windows, and calculates the relational function of dynamic changes. The third part (lines 14–16) constructs a dynamic knowledge graph and obtains the suspicious candidate group.
The time complexity of user relationship feature extraction is
Graph community detection algorithm
Algorithm 2 mainly includes two parts. The first part (lines 1–4) reads the data and calculates the modularity
The time complexity of computing graph structure modularity is
Experiment and analysis
This part first introduces the simulation platform, experimental parameters, and interface settings. Then the simulation experiments are carried out on the detection of the shilling attackers, and the influence of the factors proposed in this paper on the detection is given. Finally, the experimental results are analyzed and compared with other models on the Amazon data set.
Experiment platform NetLogo
With NetLogo, the simulation world can be manipulated through instructions to observe the changes in the simulation world. As long as the properties and behavior rules of each subject input clear commands can make the simulation system run. Each agent in NetLogo is a visual, self-acting actor, which makes it possible to explore the connections between individual behavior at the micro-level and the macro-patterns. NetLogo can be applied to many fields of natural and social sciences, such as biology, medicine, physics, chemistry, computer science, as well as economics and social psychology. 39 For example, the SIR Susceptible Infected Removed (SIR) network virus spread model based on NetLogo shows the spread of viruses through the network. 40
Simulation interface design
In a social recommender system, each social sensor can change its state through mutual influence and changes. The main purposes of simulation modeling are follows: (1) observe the interpersonal network generated by the activities of social sensors in the social environment, as the autonomy of social sensors, (2) observe the effect of user weight function on the communication ability of shilling attackers, (3) based on the dynamic time window function, the influence of detection frequency on the propagation ability of shilling attackers and the structure of user relationship network is observed, and (4) observe the impact of the number of shilling attackers on the communication ability of users, and analyze the precision and recall of shilling attack detection methods. Figure 7 shows the visual interface of the simulation system. The simulation experiment environment is composed of three interfaces: button, world, and drawing. The view area includes the social sensor social network view and the drawing interface supporting the attackers’ communication ability.

Visual interface diagram of simulation system: (a) system buttons, (b) system worlds, and (c) system drawing.
The simulation world of the attackers’ communication ability is a network of “xcor [−60, 60], ycor [−60, 60].” The meanings of the design components are described in Table 2.
Simulation experiment interface information.
The blue nodes represent the real users of the social sensors. When an attacker is added to the social network (the initial red node), the attacker will have a certain spread influence when he/she joins the network. So that users who are closely related at the time of injection are affected and become abnormal users. Due to the adaptability
Figure 8 shows the system interface for injecting false relations. The social sensors, which are the blue nodes, are set to 1000, and 15 shilling attackers are injected, which are shown as the red nodes. Users continue to establish social relationships and form social networks. It can also be observed that they are divided into many closely related user groups. Attackers are asked to establish false relationships with these user groups and injected into the user’s social network to achieve the purpose of the shilling attacker to influence the recommender system.

Shilling attack injection interface.
Evaluation indicators
From the perspective of shilling attack detection, the judgment of shilling attackers can be regarded as a classification problem. The commonly used metrics are precision, recall, and
where
Analysis of simulation
Influence of MWTIv function on elapsed time
Set the value of the user relationship weight function

Influence of
The CO-convergence of social sensors makes the ad-adaptability and attention relationship between users more stable when there are no emergencies. When the false relationship is injected by the attackers, the attackers cannot participate in the social activities in the normal mode, so it is identified and eliminated. The larger the user relationship function between real users is, the more active social activities are, and the attackers can be identified more quickly.
Impact of dynamic time sliding window on communication ability
The width of the time window should be flexible according to emergencies, changes in the number of comments, and changes in relationships. The faster the detection frequency, the shorter the discovery time for the attackers, thus, the detection efficiency of the system can be improved. Some of the attackers injected in the same batch are detected and removed from the system, so the spreading influence of this batch of attackers will be weakened. As shown in Figure 10, the time intervals of emergencies are set to 7, 6, 5, 4, 3, and 2, respectively, that is, the smaller the time interval of emergencies, the higher the frequency of events. At this time, the

The influence of detection frequency on propagation capability (the time interval is 7, 6, 5, 4, 3, and 2).
Table 3 shows the apex of the red curve indicating the transmission capability and the turning point of the gray curve indicating the elapsed time. It can be seen that as the detection frequency increases, the horizontal and vertical coordinates of the flat point of the gray curve decrease in turn. This means that the elapsed time of influence capacity is shortened. Given a fixed time
The coordinates of the vertices of the polyline.
Effect of the number of attackers on the time of influence disappearance
Figure 11 shows the influence of the number of attackers on the communication power. The gray broken line indicates that the affected real users have restored their original preferences. The actual users are set to 1000, and the number of attackers is 15, 30, 45, 60, 75, and 90. The starting point of the red curve represents the number of attackers detected, the highest point represents the strength of the propagation ability, and the point where the ordinate tends to zero represents the time when the propagation ability has elapsed. Table 4 shows the values of each coordinate value, accuracy rate, and recall rate. As the number of attackers increases, the ordinate of the highest point of the red curve, which is the peak point of influence, gradually increases from 14.21 to 30.3. This phenomenon indicates that the greater the number of attackers injected at one time, the greater the influence. The time point of influence disappeared gradually increased from 129 to 170. Taking the average value as

The impact of the number of attackers on the spread (shilling attackers =15, 30, 45, 60, 75, and 90).
The influence parameters of the number of attackers on the propagation power.
After simulation, it is confirmed that the user weight function and the variable time interval window function have a certain effect on the influence ability and detection efficiency of the trust attack. User relationship weight function
Model comparison based on the Amazon data set
The Amazon data set is used as the scoring database of the recommender system for experiments. The comparison detection algorithms include a group attack detection method based on graph embedding (GAGE),
41
a DeepWalk detection method which takes a graph as input and produces a latent representation as an output (GADW),
42
and a novel technique for identifying group attack profiles (DeR-TIA).
43
GAGE is a group attack detection method based on graph embedding. First, the user relationship graph is constructed by analyzing the user’s scoring behavior, and the low-dimensional vector representation of nodes is obtained by graph embedding method, and then the attack group is identified by twice clustering. GADW is a new method to learn the potential representation of vertices in networks. These potential representations encode social relations in a continuous vector space. Social representation is the potential feature of capturing the vertices of domain similarity and community membership. DeR-TIA is a two-stage method for detecting group shilling attacks. First, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim) metrics and

Performance comparison of different approaches.
It can be concluded that AOUSD model is better than GAGE, GADW, and DeR-TIA models in accuracy, recall, and
Using the NetLogo simulation, it is proved that the change of user relationship weight function and dynamic time window function have a certain impact on the transmission and propagation ability of trust attackers. Further by comparing with other detection methods, AOUSD shows efficiency and effectiveness on shilling attack detection. Hence, it can be concluded that the factor direction considered in the proposed security detection method based on user autonomous sensor is effective, and the detection efficiency of trust attack is considerable.
Conclusion and future work
The existence of shilling attackers affects the security of recommendation network and causes bad user experience. In order to improve the accuracy and flexibility of shilling attack detection, a security detection method based on AOUSD is proposed. Users are modeled as social sensors with autonomy characteristic, and a dynamic knowledge graph is formed by adding variable time and event sliding windows. After forming the graph structure, graph community detection is used for clustering, which reduces the misjudgment rate of shilling attackers. The experiments show that the false relationship shilling attackers can be quickly detected through the introduction of social sensors, user relationship function, time window, and other factors. The proposed AOUSD has the following characteristics:
The intrinsic attributes of social sensors are used to build a knowledge graph, which reduces the dependence on user historical scores and other information.
The sliding window of variable time and events is added to the static knowledge graph, which makes the network map change with time, more real-time and comprehensive information utilization.
The following characteristics of the shilling attackers are used to detect: the shilling attackers cannot participate in social activities, and the communication ability of the shilling attackers disappears with time and events.
The dynamic knowledge graph is a white box, which increases the interpretability of the detection system and facilitates the optimal design of the detection system.
In the future work, we will focus on how to build a user autonomy model to better identify shilling attackers when shilling attackers have more complex behavior curves. In addition, we will use graph convolution to realize the shilling attack detection based on dynamic knowledge graph to improve the detection accuracy.
