Processing math: 100%
Research article Special Issues

A novel Kalman Filter based shilling attack detection algorithm

  • Received: 12 September 2019 Accepted: 01 December 2019 Published: 04 December 2019
  • Collaborative filtering has been widely used in recommendation systems to recommend items that users might like. However, collaborative filtering based recommendation systems are vulnerable to shilling attacks. Malicious users tend to increase or decrease the recommended frequency of target items by injecting fake profiles. In this paper, we propose a Kalman filter-based attack detection model, which statistically analyzes the difference between the actual rating and the predicted rating calculated by this model to find the potential abnormal time period. The Kalman Filter filters out suspicious ratings based on the abnormal time period and identifies suspicious users based on the source of these ratings. The experimental results show that our method performs much better detection performance for the shilling attack than the traditional methods.

    Citation: Xin Liu, Yingyuan Xiao, Xu Jiao, Wenguang Zheng, Zihao Ling. A novel Kalman Filter based shilling attack detection algorithm[J]. Mathematical Biosciences and Engineering, 2020, 17(2): 1558-1577. doi: 10.3934/mbe.2020081

    Related Papers:

    [1] Florencia G. Palis, R. M. Lampayan, R.J. Flor, E. Sibayan . A multi-stakeholder partnership for the dissemination of alternate wetting and drying water-saving technology for rice farmers in the Philippines. AIMS Agriculture and Food, 2017, 2(3): 290-309. doi: 10.3934/agrfood.2017.3.290
    [2] Theodor Friedrich, Amir Kassam . Food security as a function of Sustainable Intensification of Crop Production. AIMS Agriculture and Food, 2016, 1(2): 227-238. doi: 10.3934/agrfood.2016.2.227
    [3] Boris Boincean, Amir Kassam, Gottlieb Basch, Don Reicosky, Emilio Gonzalez, Tony Reynolds, Marina Ilusca, Marin Cebotari, Grigore Rusnac, Vadim Cuzeac, Lidia Bulat, Dorian Pasat, Stanislav Stadnic, Sergiu Gavrilas, Ion Boaghii . Towards Conservation Agriculture systems in Moldova. AIMS Agriculture and Food, 2016, 1(4): 369-386. doi: 10.3934/agrfood.2016.4.369
    [4] Isaac Busayo Oluwatayo . Towards assuring food security in South Africa: Smallholder farmers as drivers. AIMS Agriculture and Food, 2019, 4(2): 485-500. doi: 10.3934/agrfood.2019.2.485
    [5] Fernando Arias, Maytee Zambrano, Kathia Broce, Carlos Medina, Hazel Pacheco, Yerenis Nunez . Hyperspectral imaging for rice cultivation: Applications, methods and challenges. AIMS Agriculture and Food, 2021, 6(1): 273-307. doi: 10.3934/agrfood.2021018
    [6] J.M.A. Duncan, J. Dash, E.L. Tompkins . Observing adaptive capacity in Indian rice production systems. AIMS Agriculture and Food, 2017, 2(2): 165-182. doi: 10.3934/agrfood.2017.2.165
    [7] Raulston Derrick Gillette, Norio Sakai, Godfrid Erasme Ibikoule . Role and impact of contract farming under various pricing standards: A case of Guyana's rice sector. AIMS Agriculture and Food, 2024, 9(1): 336-355. doi: 10.3934/agrfood.2024020
    [8] Karin Lindsjö, Agnes Anderssonc Djurfeldt, Aida Cuthbert Isinika, Elibariki Msuya . Youths' participation in agricultural intensification in Tanzania. AIMS Agriculture and Food, 2020, 5(4): 681-699. doi: 10.3934/agrfood.2020.4.681
    [9] Abbas Ali Chandio, Yuansheng Jiang, Abdul Rehman, Rahman Dunya . The linkage between fertilizer consumption and rice production: Empirical evidence from Pakistan. AIMS Agriculture and Food, 2018, 3(3): 295-305. doi: 10.3934/agrfood.2018.3.295
    [10] Deborah Nabuuma, Beatrice Ekesa, Mieke Faber, Xikombiso Mbhenyane . Food security and food sources linked to dietary diversity in rural smallholder farming households in central Uganda. AIMS Agriculture and Food, 2021, 6(2): 644-662. doi: 10.3934/agrfood.2021038
  • Collaborative filtering has been widely used in recommendation systems to recommend items that users might like. However, collaborative filtering based recommendation systems are vulnerable to shilling attacks. Malicious users tend to increase or decrease the recommended frequency of target items by injecting fake profiles. In this paper, we propose a Kalman filter-based attack detection model, which statistically analyzes the difference between the actual rating and the predicted rating calculated by this model to find the potential abnormal time period. The Kalman Filter filters out suspicious ratings based on the abnormal time period and identifies suspicious users based on the source of these ratings. The experimental results show that our method performs much better detection performance for the shilling attack than the traditional methods.


    Currently it is the digital era where there is a steady flood of information. Such information inundation makes a variety of mass media more important, for example, newspapers, broadcast, social network system media, and public speaking. Before developing mass media, rumors propagated by word of mouth and played a crucial role in communication between people or groups. This process can be understood as a kind of homogenization of information system and social interaction [1]. With the emergence of multimedia and social media, rumors have spread faster and have wide transmissions [5]. However, some harmful and powerful rumor outbreaks arise from such wide transmission via these media [10,14,18]. Moreover, their influence causes multiple effects for a variety of situations rather than the mono effect for localized situations [12].

    As a benefit in return for the homogenization, personality is more heavily emphasized and the diversity of people has garnered much attention in our social community. In the microscopic viewpoint of rumor spreading, this variety of characteristics is important. Many researchers already have investigated that the degree of belief is important in rumor spreading [8,16]. From this perspective, we assume that there will be various groups that share the same trust rate. In this paper, we propose an SIR type rumor spreading model with given spreading rate distributions λi, 1iN. Each spreading rate distribution λi represents a different character of several classes of groups. With the distribution λi, we present a sufficient condition for the rumor outbreak. To obtain a rumor outbreak, we need a sufficiently large initial quantity that represents the momentum of rumor spreading. We also provide numerical simulations to verify our analysis with several combinations of different parameters. We notice that the authors in [19] studied an SIR type rumor spreading model with a reputation mechanism and considered a probability that represents the reputation of the opinion, where reputation is related to the trust rate. They used a single ignorant SIR model. On the other hand, we consider a model with several classes of ignorants and trust rate distributions λi, 1iN.

    Next we provide a brief historical review of the rumor spreading model. Starting the pioneering studies by Daley and Kendall [3,4], a lot of researchers have studied rumor spreading and tried to build mathematical models [11,17]. Zanette [23,24] numerically obtained the existence of a critical threshold for a rumor spreading model regarding small-world networks. In [13], the authors derived the mean-field equation of complex heterogeneous networks. For other topological settings, see [7,15]. Most mathematical models for rumor spreading are based on the epidemic model. In [27], the authors considered an SIR type rumor spreading model with forgetting mechanism. See also [6,28] for other models with forgetting mechanisms. In [26], the authors added a hibernator variable to the SIR type rumor spreading model. Similarly, in [20,22], the authors adapted several new variables to construct a more realistic model for the rumor spreading phenomena. In [25], the authors employed the probability that ignorants directly become stiflers when they are aware of a rumor. We refer to papers [2,9,29] for other rumor spreading models.

    The paper is organized as follows. In Section 2, we present the trust distribution and its mechanism in the SIR type model. In Section 3, we derive a single equation for the rumor size ϕ. In Section 4, we provide proof of the main theorem. In Section 5, we demonstrate our results by numerical simulations. Finally, we summarize our results in Section 6.

    Notation: Throughout the paper, we use the following simplified notation:

    I(t)=(I1(t),,IN(t)),    ˚I=(˚I1,,˚IN),    ˚In=(˚In1,,˚InN),    n,NN.

    Let V and E be sets of vertices and edges, respectively. Representing the individuals and contacts as the vertices and edges, a social network leads to an undirected graph G=(V,E). A general social network is close to a small-world network [21]. In [13], the authors derived the mean-field rate equation based on the Poisson distribution of small-world network. As in [13], we consider a rumor spreading model based on the SIR model of a homogeneous network.

    There are three groups of populations: ignorants (I), spreaders (S), and stiflers (R). At the first stage, ignorants contact a spreader, realize a rumor, and accept the hearsay. According to the acceptance with rate λ, some of them become spreaders and then spread the rumor to other ignorants. However, as spreaders lose interest in spreading the rumor, they become stiflers. Based on this mechanism, the SIR rumor spreading model [3,4] is given by

    ˙I=kλSI,˙S=kλSIkS(σ1S+σ2R),˙R=kσS(S+R),

    where k is the average degree of the network, λ is the spreading rate of the system, σ1 is the contact rate between spreaders, and σ2 is the contact rate between spreaders and stiflers.

    As in [25], we assume that spreaders lose their interest in rumors with probability δ and become stiflers. Moreover, stiflers interact with spreaders to create other stiflers from other spreaders. Spreaders also have a negative effect on other spreaders because they consider the rumor to be outdated if the spreader meets with other spreaders frequently. For simplicity, we assume that the contact rates σ1 and σ2 are the same, say σ=σ1=σ2. As mentioned before, we consider several groups of ignorants with different spreading rates λi, i=1,,N, motivated by [8,16]. The mean-field equation is then given by

    ˙Ii=kλiSIi,    i=1,,N,˙S=Ni=1kλiSIikσS(S+R)δS,˙R=kσS(S+R)+δS, (1)

    subject to initial data  Ii(0)=˚Ii,i=1,,N,S(0)=˚S,R(0)=˚R, where Ii is the population density of the ith group of ignorants with spreading (trust) rate λi. S and R are the density of spreaders and stiflers, respectively. Moreover, σ is the contact rate between spreaders and stiflers, and δ denotes the decay rate of spreaders to stiflers.

    Throughout this paper, we assume that

    (1) k, σ and δ are fixed positive constants.

    (2) The spreading (trust) rate distribution λi is nonnegative constant for each 1iN.

    We will consider a family of initial data ˚I1,,˚IN, ˚S and ˚R such that

    ˚T=(Nj=1˚Ij)+˚S+˚R

    for a fixed total initial population ˚T.

    Next, we define the rumor size, a momentum type quantity of the initial data and rumor outbreak.

    Definition 2.1. [19,25,26]For a solution (I,S,R) to system (1), we define the rumor size ϕ of (I,S,R):

    ϕ(t)=t0S(τ)dτ.

    Definition 2.2. Let (I,S,R) be a solution to system (1) with initial data ˚I, ˚S and ˚R. We define initial reliability of ignorants M1(˚I):

    M1(˚I)=Ni=1λi˚Ii

    and total population with initial T(0)=˚T:

    T(t)=(Ni=1Ii(t))+S(t)+R(t).

    Definition 2.3. Let (I,S,R) be solutions to system (1) subject to initial data ˚I, ˚S and ˚R=0. If ϕ(t) in Definition 2.1 converges as t, we define ϕ as the final size of the rumor:

    ϕ(˚I,˚S):=limtϕ(t).

    Definition 2.4. For a given initial data ˚I,˚S and ˚R of system (1) with ˚S=0 and ˚R=0, let ˚In, ˚Sn and ˚Rn be sequences satisfying

    ˚In˚I,    ˚Sn0    as    n

    and

    ˚Sn>0,    ˚Rn=0    for  nN.

    We additionally assume that the total populations are the same:

    ˚T=(Ni=1˚Ii)+˚S+˚R=(Ni=1˚Ini)+˚Sn+˚Rn=˚Tn.

    We say that a rumor outbreak occurs if the following limit exists

    ϕe(˚I)=limnϕ(˚In,˚Sn)

    and ϕe(˚I) is positive, where ϕ(˚In,˚Sn) is the final size of the rumor for the initial data ˚In, ˚Sn, ˚Rn.

    Remark 1. (1) In [13,15,25], the authors define that the rumor outbreak occurs if

    lim˚R0R()>0.

    This is essentially equivalent to Definition 2.4. We use ϕ() instead of R(), since R(t)=R(ϕ(t)). See the result in Lemma 3.3.

    (2) The rumor spreading begins with one spreader. Therefore, ˚S=1/N, where N is the total population number. Generally, N is a large number and this implies that ˚S0. However, if we assume that ˚I=˚T and ˚S=˚R=0, then the corresponding solution (I(t),S(t),R(t)) is the trivial stationary solution. Therefore, to get an intrinsic property of the system, we have to consider a limit of sequence with initial data ˚Sn0.

    The following is the main theorem of this paper.

    Theorem 2.5. Let k, σ, δ and ˚T be positive constants and ˚R=˚Rn=0. Let {(In(t),Sn(t),Rn(t))} be a sequence of solutions to system (1) subject to initial data ˚In, ˚Sn and ˚Rn=0, respectively.

    We assume that each ˚Sn is positive, ˚In˚I and ˚Sn0 for an N-dimensional vector ˚I, and

    ˚T=(Nk=1˚Ink)+˚Sn=Ni=1˚Ii.

    Then, there exists the following limit of steady states:

    ϕe=ϕe(˚I)=lim˚Sn0,˚In˚Iϕ(˚In,˚Sn),

    where ϕ(˚In,˚Sn) is the final size of the rumor for the initial data ˚In and ˚Sn with ˚Rn=0.

    Furthermore, if kM1(˚I)>δ, ϕe(˚I) is positive and if kM1(˚I)δ, ϕe(˚I) is zero.

    Remark 2. An equivalent condition of occurring a rumor outbreak is

    kM1(˚I)>δ.

    In this section, we derive a single equation for ϕ and consider the steady state analysis for the rumor spreading model (1) via a derived single equation of ϕ from the next argument.

    Lemma 3.1. Let (I,S,R) be a solution to system (1) with an initial data ˚I, ˚S and ˚R. Then each Ii(t) satisfies

    Ii(t)=˚Iiekλiϕ(t),    i=1,,N, (2)

    where ϕ(t) is a function defined in Definition 2.1.

    Proof. From the first equation of system (1), we have

    ddtlogIi(t)=kλiS(t),    i=1,,N.

    Integrating the above relation gives

    logIi(t)=log˚Iit0kλiS(τ)dτ,    i=1,,N.

    For the population density of S(t), we can obtain the following formula for Ii:

    Ii(t)=˚Iiet0kλiS(τ)dτ,    i=1,,N.

    Clearly, we have ddtϕ(t)=S(t), which implies that ϕ(t)ϕ(0)=t0S(τ)dτ.

    Lemma 3.2. Let (I,S,R) be a solution to system (1) with initial data ˚I, ˚S and ˚R. For the given initial data, the total population T(t) of the solution to system (1) is conserved. Thus, we have

    T(t)=˚T,    for    any  t>0. (3)

    Proof. Note that the summation of all equations in system (1) yields

    (Ni=1˙Ii)+˙S+˙R=0.

    Integrating the above equation leads to

    T(t)=(Ni=1Ii(t))+S(t)+R(t)=(Ni=1˚Ii)+˚S+˚R=˚T.

    Remark 3. By the conservation property (3) in Lemma 3.2 and the formula in (2), we easily obtain the following formula for S(t):

    S(t)=˚TNi=1Ii(t)R(t)=˚TNi=1˚Iiekλiϕ(t)R(t). (4)

    Lemma 3.3. Let (I,S,R) be a solution to system (1) with initial data ˚I, ˚S and ˚R. Then R(t) is a function depending on ϕ:

    R(t)=R(ϕ(t))=˚R+kσ˚Tϕ(t)kσλi0˚Ii1ekλiϕ(t)kλikσλi=0˚Iiϕ(t)+δϕ(t).

    Proof. The third equation in system (1) gives us that

    R(t)˚R=t0˙R(τ)dτ=t0[kσS(τ)(S(τ)+R(τ))+δS(τ)]dτ.

    From (4) and the definition of ϕ: ϕ(t)=t0S(τ)dτ, we get

    R(t)˚R=kσt0S(τ)[S(τ)+R(τ)]dτ+δϕ(t)=kσt0S(τ)(˚TNi=1Ii(τ))dτ+δϕ(t)=kσt0ϕ(τ)(˚TNi=1˚Iiekλiϕ(τ))dτ+δϕ(t)=kσ˚Tt0ϕ(τ)dτλi0kσt0ϕ(τ)˚Iiekλiϕ(τ)dτλi=0kσt0ϕ(τ)˚Iiekλiϕ(τ)dτ+δϕ(t)=K1+K2+K3+K4.

    We directly have K1 and K4 with

    K1=kσ˚Tϕ(t)    and    K4=δϕ(t).

    For K2, we use λi0 for all 1iN. By the change of variables and the fact that ϕ(0)=0, we obtain

    K2=λi0kσt0ϕ(τ)ekλiϕ(τ)dτ=λi0kσϕ(t)ϕ(0)ekλiηdη=λi0kσekλiϕ(0)ekλiϕ(t)kλi=λi0kσ1ekλiϕ(t)kλi.

    Similarly, we have K3 with

    K3=λi=0kσt0ϕ(τ)ekλiϕ(τ)dτ=λi=0kσt0ϕ(τ)dτ=λi=0kσ(ϕ(t)ϕ(0))=λi=0kσϕ(t).

    Therefore, the above elementary calculations yield

    R(t)˚R=kσ˚Tϕ(t)kσλi0˚Ii1ekλiϕ(t)kλikσλi=0˚Iiϕ(t)+δϕ(t).

    The formula (4) of S(t) implies that

    dϕ(t)dt=S(t)=˚TNi=1˚Iiekλiϕ(t)R(t).

    By the result in Lemma 3.3, we derive a single decoupled equation for ϕ such that

    dϕ(t)dt=˚TNi=1˚Iiekλiϕ(t)˚Rkσ˚Tϕ(t)+kσλi0˚Ii1ekλiϕ(t)kλi+kσλi=0˚Iiϕ(t)δϕ(t).

    For simplicity, we define

    F(ϕ)=F(ϕ,˚I,˚S,˚R,˚T):=˚TNi=1˚Iiekλiϕ˚Rkσ˚Tϕ+kσλi0˚Ii1ekλiϕkλi+kσλi=0˚Iiϕ(t)δϕ. (5)

    Then, ϕ(t) is the solution to the following single equation subject to initial data ϕ(0)=0.

    ˙ϕ(t)=F(ϕ(t)). (6)

    In this section, we use the steady state analysis to obtain the threshold phenomena for asymptotic behavior of the solution to system (1). To obtain the asymptotic behavior of solutions to (6), we first consider a steady state ϕ to (6). In other words, the steady state ϕ satisfies

    F(ϕ)=0, (7)

    where F(ϕ)=F(ϕ,˚I,˚S,˚R,˚T) is the function defined in (5). Therefore, ϕ is one of solutions to equation (7). Using a standard method from [19,25,26], we can obtain a sufficient condition for the existence of nontrivial zeros. We define G and H by

    G(ϕ)=G(ϕ,˚I,˚S,˚R,˚T)=˚TNi=1˚Iiekλiϕ˚R+kσλi0˚Ii1ekλiϕkλi (8)

    and

    H(ϕ)=H(ϕ,˚I,˚S,˚R,˚T)=(δ+kσ˚Tkσλi=0˚Ii)ϕ. (9)

    Then, we divide F into two parts G and H with F(ϕ)=G(ϕ)H(ϕ). Note that F is the difference between the exponential part G and the linear part H. Hence equation (7) is equivalent to the following:

    H(ϕ)=G(ϕ).

    Lemma 4.1. Let G() be a function defined in (8) for a given initial data ˚I,˚S,˚R and ˚T. If ˚T=Ni=1˚Ii+˚S+˚R, the following properties hold:

    G(0)=˚S,    and    limϕG(ϕ)<,    if   ˚R=0.

    Proof. By the definition of G, we have G(0)=˚TNi=1˚Ii˚R=˚S. Relation (4) yields the first result in this lemma.

    For the next result, we take the limit such that

    limϕG(ϕ)=limϕ(˚TNi=1˚Iiekλiϕ˚R+kσλi0˚Ii1ekλiϕkλi)=limϕ(˚Tλi0˚Iiekλiϕλi=0˚Ii˚R+kσλi0˚Ii1ekλiϕkλi)=˚Tλi=0˚Ii˚R+kσλi0˚Iikλi.

    Therefore, we have limϕG(ϕ)=˚S+kσλi0˚Iikλi. Notice that the second term on the right hand side of the above equation is finite.

    kσλi0˚Iikλi<.

    Therefore, we conclude that limϕG(ϕ)<.

    Lemma 4.2. Assume that k and σ are positive constants, λi0 and ˚Ii0 for all i=1,,N. Let G() be the function defined in (8). If M1(˚I)>0, then the derivative G() is positive and

    dGdϕ=λi0(kλi˚Iiekλiϕ+kσ˚Iiekλiϕ)>0.

    Proof. Note that the derivative of G is

    dGdϕ=ddϕNi=1˚Iiekλiϕ+kσλi0˚Iiekλiϕ.

    We can calculate the first term in the above as

    ddϕNi=1˚Iiekλiϕ=ddϕλi0˚Iiekλiϕ+ddϕλi=0˚Iiekλiϕ=ddϕλi0˚Iiekλiϕ+ddϕλi=0˚Ii=λi0kλi˚Iiekλiϕ.

    Thus, if at least one non-zero λi˚Ii exists, we have

    dGdϕ=λi0kλi˚Iiekλiϕ+kσλi0˚Iiekλiϕ>0.

    Lemma 4.3. Let k and σ be positive constants and δ0. Let H() be the function defined in (9). If ˚T=Ni=1˚Ii+˚S+˚R, and initial data ˚Ii, ˚S and ˚R are nonnegative for all i=1,,N, then H() is a linear function with nonnegative slope and H(0)=0.

    Proof. Note that

    δ+kσ˚Tkσλi=0˚Ii=δ+kσ(Ni=1˚Ii+˚S+˚R)kσλi=0˚Ii=δ+kσ(λi0˚Ii+˚S+˚R).

    Therefore, δ+kσ˚Tkσλi=0˚Ii is positive and this means that δ+kσ˚T>kσλi=0˚Ii. This implies that H() is monotone increasing with H(0)=0.

    Proposition 1. Let k, σ and δ be positive constants. Let (I,S,R) be a solution to system (1) with initial data ˚I,˚S and ˚R. We assume that ˚S is positive, ˚I0, ˚R=0 and ˚T=Ni=1˚Ii+˚S+˚R.

    Then there is a final rumor size ϕ(˚I,˚S) such that

    ϕ(˚I,˚S):=limtϕ(t),

    where ϕ(t) is the rumor size satisfying (6). Moreover, ϕ(˚I,˚S) is the smallest positive zero of F() such that

    F(ϕ(˚I,˚S))=0.

    Proof. This follows from an elementary result of ordinary differential equations. Note that for given initial data ˚S>0, ˚I0 and ˚R=0, the corresponding equation ˙ϕ=F(ϕ) is autonomous. Therefore, we can apply Lyapunov's stability theorem. From the properties of G() and H() in Lemmas 4.1 and 4.3, we have

    F(0)=G(0)H(0)=˚S>0,

    and

    limϕF(ϕ)=G(ϕ)H(ϕ)=.

    By the intermediate value theorem, there is at least one positive solution ψ>0 such that 0=F(ψ)=F(ψ,˚I,˚S,˚R,˚T) for a given initial data ˚I, ˚S and ˚R. Let ϕ be the smallest element of the set of positive solutions {ψ>0:F(ψ)=0}.

    For a fixed ˚S>0, F(0)=˚S>0. This shows that ϕ(t) is increasing near t=0 and F(x)>0 on {0<x<ϕ}. Moreover, F(x) is differentiable with respect to x, which implies that ϕ(t)ϕ as t by an elementary result of ordinary differential equations.

    Proposition 2. Let k, σ and δ be positive constants and λi0 for all i=1,,N. Suppose that ˚Ii0, i=1,,N, ˚R=˚S=0 and ˚T is a fixed positive constant with ˚T=Ni=1˚Ii. If we assume that M1(˚I)>0, then the following statement holds.

    The equation F(ϕ,˚I,˚S,˚R,˚T)=0 has a positive solution ϕ>0 if and only if kM1>δ. Moreover, if kM1δ, then the equation has no positive zero and ϕ=0 is a solution to the equation.

    Proof. We have, by Lemma 4.1 and 4.3,

    G(0)=˚S=0,    limϕG(ϕ)<

    and

    H(0)=0,    limϕH(ϕ)=.

    It follows that F(0)=0 and

    limϕF(ϕ)=. (10)

    Lemma 4.2 implies that the derivative of G(ϕ) is positive and

    dGdϕ=λi0kλi˚Iiekλiϕ+kσλi0˚Iiekλiϕ>0.

    Moreover, if ˚S=0, then we have

    dHdϕ(ϕ,˚I,˚S,˚R,˚T)=δ+kσ˚Tkσλi=0˚Ii.

    Therefore,

    dFdϕ=dGdϕdHdϕ=λi0kλi˚Iiekλiϕ+kσλi0˚Iiekλiϕ(δ+kσ˚Tkσλi=0˚Ii). (11)

    So,

    dFdϕ(0)=dGdϕ(0)dHdϕ(0)=λi0kλi˚Ii+kσλi0˚Ii(δ+kσ˚Tkσλi=0˚Ii)=λi0kλi˚Iiδ=kM1δ.

    This yields

    kM1>δdFdϕ(0)>0, (12)

    and the continuity of F implies that there is a positive real number ϕϵ>0 such that

    F(ϕϵ)>0.

    Thus, the intermediate value theorem and (10) show that F(ϕ,˚I,˚S,˚R,˚T)=0 has a positive solution ϕ>0.

    In order to complete the proof of this proposition, it suffices to verify that the equation has a unique solution ϕ=0 on {ϕ0} if kM1δ.

    We now assume that kM1δ. We rewrite (11) by

    dFdϕ=λi0kλi˚Iiekλiϕ+kσλi0˚Iiekλiϕ(δ+kσ˚Tkσλi=0˚Ii)=λi0kλi˚Iiekλiϕ+kσλi0˚Iiekλiϕ(δ+kσ˚Tkσλi=0˚Iiekλiϕ)=Ni=1kλi˚Iiekλiϕ+kσNi=1˚Iiekλiϕδkσ˚T.

    Since we assume that Ni=1kλi˚Ii=kM1δ and ˚T=Ni=1˚Ii,

    dFdϕNi=1kλi˚Iiekλiϕ+kσNi=1˚IiekλiϕNi=1kλi˚IikσNi=1˚Ii=Ni=1kλi˚Ii(ekλiϕ1)+kσNi=1˚Ii(ekλiϕ1).

    This implies that

    dFdϕ<0     if    ϕ>0,     and     dFdϕ0     if    ϕ=0.

    The fact in (10) with F(0)=0 leads us to

    F(ϕ)<0    for ϕ>0.

    Therefore, we complete the proof.

    We are now ready to prove the main theorem.

    The proof of the main theorem. Let ˚Rn=˚R=0 and let ˚In and ˚Sn be sequences such that

    ˚In˚I,    ˚Sn0. (13)

    We denote

    F(ϕ,˚Sn)=F(ϕ,˚In,˚Sn,˚Rn,˚T)    and    F(ϕ)=F(ϕ,˚I,˚S,˚R,˚T).

    First, assume that kM1(˚I)>δ. By (12), we have

    F(0)=0     and    ddϕF(ϕ)|ϕ=0>0.

    Note that (11) implies that

    Fϕ(ϕ,˚In,˚Sn,˚Rn,˚T)=λi0kλi˚Iniekλiϕ+kσλi0˚Iniekλiϕ(δ+kσ˚Tkσλi=0˚Ini)=λi0kλi˚Iniekλiϕ+kσλi0˚Iniekλiϕ(δ+kσ˚Tkσλi=0˚Iniekλiϕ)=Ni=1kλi˚Iniekλiϕ+kσNi=1˚Iniekλiϕδkσ˚T=Ni=1kλi˚Ini(ekλiϕ1)+Ni=1kλi˚Ini+kσNi=1˚Iniekλiϕδkσ((Ni=1˚Ini)+˚Sn).

    Therefore,

    Fϕ(ϕ,˚In,˚Sn,˚Rn,˚T)=Ni=1kλi˚Ini(ekλiϕ1)+kσNi=1˚Ini(ekλiϕ1)kσ˚Sn+kM1(˚In)δ.

    By (13), there is N0N such that if n>N0, then

    kM1(˚In)δ>12(kM1(˚I)δ)

    and

    kσ˚Sn14(kM1(˚I)δ).

    Since ˚Ini is bounded, we can choose ϵϕ such that if 0ϕϵϕ, then

    |Ni=1kλi˚Ini(ekλiϕ1)+kσNi=1˚Ini(ekλiϕ1)|14(kM1(˚I)δ).

    Thus, there are constants ϵϕ>0,N0N such that if 0ϕ<ϵϕ and n>N0, then

    Fϕ(ϕ,˚In,˚Sn,˚Rn,˚T)>0. (14)

    In order to prove convergence, we consider differentiable functions I(s),S(s) and R(s) with respect to sR such that

    I(1/n)=˚In,    S(1/n)=˚Sn,    R(1/n)=˚Rn,    nN,

    and

    ˚T=(Ni=1Ii(s))+S(s)+R(s).

    We denote Fp(ϕ,s)=Fp(ϕ,I(s),S(s),R(s),˚T). Since ϕF(ϕ,s)|ϕ=0,s=0>0, the implicit function theorem implies that ϕ(s) is differentiable near s=0. Thus, ϕ(˚In,˚Sn)=ϕ(1/n) converges.

    We now prove that ϕnϕe>0. Assume not, that is ϕn0 as n. Then there is a N1N such that n>N1 implies ϕn(˚S)<ϵϕ. We may take N1N such that N1>N0.

    For n>N1, we have F(0,˚In,˚Sn,˚Rn,˚T)=˚Sn>0 and F(ϕn,˚In,˚Sn,˚Rn,˚T)=0. However, by (14), Fϕ(ϕ,˚In,˚Sn,˚Rn,˚T)>0. This is a contradiction. Thus we obtain the desired result.

    For the last part, we assume that kM1δ. Then, ϕ=0 is the unique nonnegative solution to F(ϕ,˚I,˚S,˚R,˚T)=0. Moreover ϕ(˚In,˚Sn)>0. Let {ϕnn} be any convergent subsequence of {ϕ(˚In,˚Sn)}.

    Let ϕn=limnϕnn0. Since F is a continuous function,

    limnF(ϕnn,˚Inn,˚Snn,˚Rnn,˚T)=F(ϕn,˚I,0,0,˚T).

    Therefore, by Proposition 2, ϕn=0, i.e., limnϕnn=0. We proved that any convergent subsequence of {ϕ(˚In,˚Sn)} converges to zero. Thus, by an elementary theorem in analysis,

    limnϕn=0.

    In this section, we numerically provide the solutions to system (1) with respect to several δ and compare them with the analytical results in Section 4. The main result in this paper suggests that the condition for rumor outbreak is that M1(I0) is less than δ/k.

    For the numerical simulations, we used the fourth-order Runge-Kutta method with the following parameters:

    λ1=1,    λ2=2,    λ3=3,    σ=0.2,    k=10.

    We take sufficiently large initial data ˚Ii, i=1,2 and 3, and sufficiently small ˚S such that

    ˚I1=˚I2=˚I3=9999,    ˚S=3,    ˚R=0.

    To see the threshold phenomena for M1(I0) and δ/k, we consider δ=0.5×105,1.5×105,2.5×105,3.5×105,4.5×105 and 5.5×105.

    Note that in Proposition 1, we rigorously obtained that the final size of the rumor ϕ=limtϕ(t) is the smallest positive zero of F(ϕ). In Figure 1, we plotted the rumor size ϕ(t) and F(ϕ) with respect to several δ>0. Here, we can observe that the final size of the rumor ϕ is also the smallest positive zero of F(ϕ). Thus the numerical results are consistent with the analytical result.

    Figure 1.  Temporal evolution of ϕ(t) with respect to δ and the plot of F(ϕ).

    In Figure 2, we plotted the densities of the spreaders (S) and the stiflers (R) with respect to several δ>0. Thus, we can see that the rumor size are proportional to 1/δ.

    Figure 2.  Temporal evolution of the densities S(t) and R(t) with respect to δ.

    In Figure 3, we plotted ϕ with respect to δ>0 to see the threshold phenomena for M1(I0) and δ/k. Note that ˚S0,M1(˚I)=λ1˚I1+λ2˚I2+λ2˚I26×104.

    Figure 3.  The final size of the rumor ϕ with respect to δ.

    From our analytic results, we can expect that the threshold occurs when δ=kM1(˚I)6×105. In Figure 3, ϕ decreases almost linearly in δ, and the graph of ϕ(δ) is very close to the line ϕ=0 as δ goes to 6×105. Therefore, this numerical simulation coincides with our analytic result. By the way, a small error occurs between the analytical and the numerical results. We guess that this error may result from the nonzero assumption for ˚S>0.

    In this paper, we consider the rumor spreading model with the trust rate distribution. The model consists of several ignorants with trust rates λi, i=1,,N. We provide the threshold phenomenon for this model by using classical steady state analysis. Fortunately, we can obtain the corresponding equation of rumor size for this model with several types of ignorants. We also present a rigorous proof for the convergence result. As seen from the steady state analysis, we obtain that the threshold phenomena depends on the decay rate δ of spreaders to stiflers and the momentum type quantity M1 defined in Definition 2.2:M1(˚I)=Ni=1λi˚Ii. We conclude that a necessary and sufficient condition for rumor outbreak is that the trust momentum M1(˚I) is greater than some combination of parameters δ/k.



    [1] P. A. Chirita, W. Nejdl and C. Zamfir, Preventing shilling attacks in online recommender systems, 2005 ACM International Workshop on Web Information and Data Management (WIDM), 2005. Available from: https://dlnext.acm.org/doi/abs/10.1145/1147376.1147387.
    [2] R. Burke, B. Mobasher, C. Williams and R. Bhaumik, Classification features for attack detection in collaborative recommender systems, 2006 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2006. Available from: https://dlnext.acm.org/doi/proceedings/10.1145/1150402.
    [3] C. A. Williams, B. Mobasher and R. Burke, Defending recommender systems: detection of profile injection attacks, SOCA, 1 (2007), 157-170.
    [4] B. Mehta, Unsupervised shilling detection for collaborative filtering, 2007 National Conference on Artificial Intelligence, 2007. Available from: https://www.aaai.org/Library/AAAI/2007/aaai07-222.php.
    [5] F. Peng, X. Zeng, H. Deng and L. Liu, Unsupervised detection of shilling attack for recommender system based on feature subset, Comput. Eng., 40 (2014), 109-114.
    [6] Z. Zhang and S. R. Kulkarni, Graph-based detection of shilling attacks in recommender systems, 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP), 2013. Available from: https://ieeexplore.ieee.org/xpl/conhome/6648476/proceeding.
    [7] Z. Wu, J. Cao, B. Mao and Y. Wang, Semi-SAD: Applying semi-supervised learning to shilling attack detection, 2011 ACM Conference on Recommender Systems (RecSys), 2011. Available from: https://dlnext.acm.org/doi/proceedings/10.1145/2043932.
    [8] C. Lv and W. Wang, Semi-supervised shilling attacks detection method based on SVM-KNN, Comput. Eng. Appl., 49 (2013), 7-10.
    [9] M. Gao, Q. Yuan, B. Ling and Q. Xiong, Detection of abnormal item based on time intervals for recommender systems, Sci. World J., 2014 (2014), 1-8.
    [10] Z. Yang and Z. Cai, Detecting abnormal profiles in collaborative filtering recommender systems, J. Intell. Inf. Syst., 48 (2017), 499-518.
    [11] W. Bhebe and O. P. Kogeda, Shilling attack detection in collaborative recommender systems using a meta learning strategy, 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), 2015. Available from: https://ieeexplore.ieee.org/xpl/conhome/7164876/proceeding.
    [12] W. Zhou, J. Wen, Q. Xiong, M. Gao and J. Zeng, SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems, Neurocomputing, 210 (2016), 197-205.
    [13] M. O'Mahony, N. Hurley, N. Kushmerick and G. Silvestre, Collaborative recommendation: A robustness analysis, ACM Trans. Internet. Technol., 4 (2004), 344-377.
    [14] B. Mobasher, R. Burke, R. Bhaumik and C. Williams, Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness, ACM Trans. Internet. Technol., 7 (2007), 23-60.
    [15] R. T. Sikora and K. Chauhan, Estimating sequential bias in online reviews: A Kalman Filtering approach, Knowledge-Based Syst., 27(2012), 314-321.
    [16] K. Inuzuka, T. Hayashi and T. Takagi, Recommendation system based on prediction of user preference changes, 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI), 2016. Available from: https://ieeexplore.ieee.org/xpl/conhome/7814734/proceeding.
    [17] C. Williams and B. Mobasher, Profile injection attack detection for securing collaborative recommender systems, DePaul Univ. CTI Technol. Repo., 2006 (2006), 1-47.
    [18] K. Fang and J. Wang, Shilling attacks detection algorithm based on nonnegative matrix factorization, Comput. Eng. Appl., 53 (2017), 150-154.
  • This article has been cited by:

    1. Carlos Ballester, Camilla Vote, John Hornbuckle, Thavone Inthavong, Vanndy Lim, Chantha Oeurng, Wendy Quayle, Vang Seng, Pheng Sengxua, Vorachith Sihathep, Veasna Touch, Philip Eberbach, Effects of Frequency of Irrigation on Dry-Season Furrow-Irrigated Maize and Peanut Production in the Rice-Growing Lowlands of the Lower Mekong Basin, 2019, 9, 2077-0472, 128, 10.3390/agriculture9060128
    2. Hao Yuan Chan, Sarina Abdul Halim-Lim, Tai Boon Tan, Nitty Hirawaty Kamarulzaman, Adi Ainurzaman Jamaludin, Wan Abd Al Qadr Imad Wan-Mohtar, Exploring the Drivers and the Interventions towards Sustainable Food Security in the Food Supply Chain, 2020, 12, 2071-1050, 7890, 10.3390/su12197890
    3. Abha Mishra, Jan Willem Ketelaar, Norman Uphoff, Max Whitten, Food security and climate-smart agriculture in the lower Mekong basin of Southeast Asia: evaluating impacts of system of rice intensification with special reference to rainfed agriculture, 2021, 1473-5903, 1, 10.1080/14735903.2020.1866852
    4. Thi Bui, Huu Tran, Hossein Azadi, Philippe Lebailly, Improving the Technical Efficiency of Sengcu Rice Producers through Better Financial Management and Sustainable Farming Practices in Mountainous Areas of Vietnam, 2018, 10, 2071-1050, 2279, 10.3390/su10072279
    5. Muhammad Shahbaz Farooq, Hira Fatima, Obaid Ur Rehman, Muhammad Yousuf, Rabia Kalsoom, Sajid Fiaz, Muhammad Ramzan Khan, Muhammad Uzair, Shuhao Huo, Major challenges in widespread adaptation of aerobic rice system and potential opportunities for future sustainability, 2023, 159, 02546299, 231, 10.1016/j.sajb.2023.06.017
    6. Yun-Ho Lee, Seong-Woo Cho, Tae-Young Hwang, On-Farm Assessment of the System of Rice Intensification (SRI) Under Rainfed Lowland Fields of Southern Cambodia, 2024, 36, 1225-8504, 63, 10.12719/KSIA.2024.36.1.63
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4571) PDF downloads(363) Cited by(3)

Figures and Tables

Figures(13)  /  Tables(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog