Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent general evaluation method and system for vulnerability of recommendation system

A recommendation system and vulnerability technology, applied in the information field, can solve the problems of high recommendation system, high cost, and a lot of manpower and material support, and achieve the effect of guiding design, accurate evaluation, and low labor cost

Inactive Publication Date: 2020-07-14
PEKING UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The former requires the attacker to have strong domain knowledge, artificially inductive attack strategies, and the cost is high, and for the platform itself, it requires a lot of manpower and material support; the latter can achieve good results by using some optimization algorithms without requiring a lot of manpower , but the premise is that the system has a high level of authority, and at the same time, there are strong restrictions on the recommended system being attacked. It can only target a relatively single and simple recommendation algorithm
The current recommendation system, on the one hand, has high privacy, and it is impossible for an attacker to have high authority on the recommendation system. On the other hand, with the development of deep learning and the increase in the complexity of business processes, it is no longer a single simple algorithm. expressive
Therefore, this kind of algorithm shows different attack effects on different recommendation systems, and cannot give convincing vulnerability evaluation results.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent general evaluation method and system for vulnerability of recommendation system
  • Intelligent general evaluation method and system for vulnerability of recommendation system
  • Intelligent general evaluation method and system for vulnerability of recommendation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Based on the e-commerce recommendation platform, the following is a more specific introduction to the vulnerability detection method of the adaptive recommendation system proposed by the present invention, including some background knowledge during algorithm design, and the specific process of reinforcement learning algorithm training.

[0038]First, we assume that there is an attacker, and describe the scope and target of the attacker's operation authority on the recommendation system in real situations.

[0039] 1. Due to the privacy of the recommendation system itself, the attacker cannot know: (1) which recommendation algorithms are specifically used by the recommendation system and what steps are in the recommendation process; (2) the operation log information of other users. The attacker only knows the basic product information and the roughly estimated product popularity information through multiple interactions with the system.

[0040] 2. The attacker's attack ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an intelligent general evaluation method and system for the vulnerability of a recommendation system. The method comprises: 1) establishing a search tree of an attack strategyfor a recommendation system, 2) learning an efficient attack strategy from the search tree by adopting a reinforcement learning algorithm, and 3) evaluating the vulnerability of the recommendation system according to the attack strategy obtained by learning and the test attack effect. Aiming at a complex recommendation system, the invention provides a scheme for efficiently and adaptively evaluating the vulnerability of the complex recommendation system. The scheme is based on the reinforcement learning architecture, excessive manual intervention is not needed, the labor cost is low, the effective attack means for the specific recommendation system can be quickly positioned, the vulnerability of the recommendation system is accurately and efficiently evaluated through the attack effect, and the obtained efficient attack strategy can also guide the design of the defense means in a more targeted manner.

Description

technical field [0001] This method belongs to the field of information technology. It is mainly aimed at the current popular online recommendation systems. It considers how to quickly and adaptively evaluate its ability to withstand hacker attacks, that is, its vulnerability, for different recommendation systems in the context of limited knowledge. This method is based on the advanced reinforcement learning technology architecture, without too much manual intervention, can efficiently explore useful attack strategies, and quickly detect the performance of different recommendation systems under different hacking strategies, so as to quickly detect their vulnerabilities. Background technique [0002] In order to better serve users, a large number of online system platforms at home and abroad have introduced more abundant and advanced algorithms to guess the preferences of new and old users, so as to recommend platform content more targetedly. One of the most basic ideas behind...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/9536G06F16/958G06Q10/06G06Q30/06G06Q50/00
CPCG06F16/9536G06F16/958G06Q10/0639G06Q30/0631G06Q50/01
Inventor 宋军帅李朝胡仄虹高军李健李振鹏
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products