{"id":144,"date":"2018-12-05T16:42:24","date_gmt":"2018-12-05T11:12:24","guid":{"rendered":"https:\/\/codeshoppy.com\/shop\/product\/anomaly-detection\/"},"modified":"2024-02-15T09:42:53","modified_gmt":"2024-02-15T04:12:53","slug":"anomaly-detection","status":"publish","type":"product","link":"https:\/\/codeshoppy.com\/shop\/product\/anomaly-detection\/","title":{"rendered":"Anomaly Detection Against Shilling Attacks"},"content":{"rendered":"<h1>Anomaly Detection Against Shilling Attacks In E-Com Site<\/h1>\n<p>Various types of web applications have gained both higher customer satisfaction and morebenefits since being successfully armed with personalized recommendation. However, the increasingly rampant shilling attackers apply biased rating profiles to systems to manipulate item recommendations, which not just lower the recommending precision and user satisfaction but also damage the trustworthiness of intermediated transaction platforms and participants.<\/p>\n<p>Many studies have offered methods against shilling attacks, especially user profile based-detection. However, this detection suffers from the extraction of the universal feature of attackers, which directly results in poor performance when facing the improved shilling attack types. This paper presents a novel dynamic time interval segmentation technique based item anomaly detection approach to address these problems. In particular, this study is inspired by the common attack features from the standpoint of the item profile, and can detect attacks regardless of the specific attack types.<\/p>\n<p>The proposed segmentation technique could confirm the size of the time interval dynamically to group as many consecutive attack ratings together as possible. In addition, apart from effectiveness metrics, little attention has been paid to the robustness of detection methods, which includes measuring both the accuracy and the stability of results. Hence, we introduced stability metric as a complement for estimating the robustness. Thorough experiments on the Movie Lens dataset illustrate the performance of the proposed approach, and justify the value of the proposed approach for online applications.<a href=\"http:\/\/Anomaly Detection Against Shilling Attacks In E-Com Site\" rel=\"nofollow\">Anomaly Detection Against Shilling Attacks In E-Com Site<\/a><\/p>\n<p><a class=\"fasc-button fasc-size-large fasc-type-flat\" style=\"background-color: #83b735; color: #ffffff;\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/drive.google.com\/drive\/folders\/1quZ2mpFeC0bXAo4_BbWOU4o4mvj9GT9y?usp=sharing\">Download Abstract &amp; PPT<\/a><\/p>\n<p><iframe loading=\"lazy\" title=\"Anomaly Detection Against Shilling Attacks In E-Com Site in Android &amp; WebApplication\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/WSfTQ0xvwKQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p><a class=\"fasc-button fasc-size-large fasc-type-flat\" style=\"background-color: #83b735; color: #ffffff;\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/codeshoppy.com\/shop\/demo108\/\">Live Demo<\/a><\/p>\n<p>Control Panel<\/p>\n<p><a class=\"fasc-button fasc-size-large fasc-type-flat\" style=\"background-color: #83b735; color: #ffffff;\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/myapphosting.in\/demo\/anomaly_detection\/controlpanel\/\">Live PHP Demo<\/a><\/p>\n<p>User Panel<\/p>\n<p><a class=\"fasc-button fasc-size-large fasc-type-flat\" style=\"background-color: #83b735; color: #ffffff;\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/myapphosting.in\/demo\/anomaly_detection\/website_v2\/  \">Live PHP Demo<\/a><\/p>\n<p><strong>Software Requirements: \u2013<\/strong><br \/>\nFront End: HTML5, CSS3, Bootstrap<br \/>\nBack End: PHP, MYSQL<br \/>\nControl End: Angular Java Script<\/p>\n<p><strong>Android Tools:<\/strong><br \/>\nIDE: Android Studio<br \/>\nAndroid Emulator<br \/>\nXAMPP 8.1 &#8211; 64 bit<\/p>\n<p><strong>PHP Tools:<\/strong><br \/>\nXAMPP 8.1 &#8211; 64 bit<\/p>\n<h4>Existing Definition<\/h4>\n<p style=\"text-align: justify;\">Many studies have offered methods against shilling attacks, especially user profile based-detection. However, this detection suffers from the extraction of the universal feature of attackers, which directly results in poor performance when facing the improved shilling attack types.<\/p>\n<p style=\"text-align: justify;\">This paper presents a novel dynamic time interval segmentation technique based item anomaly detection approach to address these problems. Inparticular, this study is inspired by the common attack features from the standpoint of the item profile, and can detect attacks regardless of the specific attack types.<\/p>\n<p><strong>Proposed Solution:<\/strong><\/p>\n<p style=\"text-align: justify;\">The proposedsegmentation technique could confirm the size of the time interval dynamically to group asmany consecutive attack ratings together as possible. In addition, apart from effectivenessmetrics, little attention has been paid to the robustness of detection methods, whichincludes measuring both the accuracy and the stability of results. Hence, we introducedstability metric as a complement for estimating the robustness. Thorough experimentson the MovieLens dataset illustrate the performance of the proposed approach, and justifythe value of the proposed approach for online applications.<\/p>\n<p style=\"text-align: justify;\"><strong>&nbsp;<\/strong><strong>System Modules:<\/strong><\/p>\n<p><strong>ADMIN<\/strong><\/p>\n<ul>\n<li>Login<\/li>\n<li>Verify Attacks<\/li>\n<li>Delete Attacks<\/li>\n<\/ul>\n<p><strong>USER<\/strong><\/p>\n<ul>\n<li>Register<\/li>\n<li>Login<\/li>\n<li>Product List<\/li>\n<li>Product description<\/li>\n<li>Ratting<\/li>\n<li>comment<\/li>\n<\/ul>\n<p><strong>MODULES: <\/strong><\/p>\n<p><strong>ADMIN:<\/strong><\/p>\n<ul>\n<li><strong>Login:<\/strong><\/li>\n<\/ul>\n<p>Admin can login this system after they can view home page.<\/p>\n<ul>\n<li><strong>Verify Attacks:<\/strong><\/li>\n<\/ul>\n<p>Admin enters this system and view verifies the attacks details.<\/p>\n<ul>\n<li><strong>Delete Attacks:<\/strong><\/li>\n<\/ul>\n<p>Admin can only provide approval to publishing the user research document.<\/p>\n<p><strong>USER:<\/strong><\/p>\n<ul>\n<li><strong>Register:<\/strong><\/li>\n<\/ul>\n<p>User enters this system and register with own details.<\/p>\n<ul>\n<li><strong>Login:<\/strong><\/li>\n<\/ul>\n<p>User can login this system after they can view home page.<\/p>\n<ul>\n<li><strong>Product list:<\/strong><\/li>\n<\/ul>\n<p>User can login this system after they can view the product list.<\/p>\n<ul>\n<li><strong>Product Description:<\/strong><\/li>\n<\/ul>\n<p>User can login this system after they can view product description.<\/p>\n<ul>\n<li><strong>Ratings:<\/strong><\/li>\n<\/ul>\n<p>User can login this system after they can view product description after that they gives for ratings.<\/p>\n<ul>\n<li><strong>Comment:<\/strong><\/li>\n<\/ul>\n<p>User can login this system after they can view product description after that they gives for comment also.<\/p>\n","protected":false},"excerpt":{"rendered":"<table style=\"border-collapse: collapse; width: 100%; height: 10px;\">\n<tbody>\n<tr style=\"height: 12px;\">\n<td style=\"width: 30%; height: 10px; text-align: center;\"><picture><source srcset=\"https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/1-2.webp 128w, https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/1-2-100x100.png 100w\" sizes=\"auto, (max-width: 60px) 100vw, 60px\" type=\"image\/webp\"><img src=\"https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/1-2.png\" height=\"60\" width=\"60\" srcset=\"https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/1-2.png 128w, https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/1-2-100x100.png 100w\" sizes=\"auto, (max-width: 60px) 100vw, 60px\" class=\"alignnone wp-image-21589 sp-no-webp\" alt=\"\" loading=\"lazy\" decoding=\"async\"  > <\/picture><br \/>\nTrusted<br \/>\nPayment<\/td>\n<td style=\"width: 30%; height: 10px; text-align: center;\"><picture><source srcset=\"https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/2-3.webp 128w, https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/2-3-100x100.png 100w\" sizes=\"auto, (max-width: 60px) 100vw, 60px\" type=\"image\/webp\"><img src=\"https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/2-3.png\" height=\"60\" width=\"60\" srcset=\"https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/2-3.png 128w, https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/2-3-100x100.png 100w\" sizes=\"auto, (max-width: 60px) 100vw, 60px\" class=\"alignnone wp-image-21590 sp-no-webp\" alt=\"\" loading=\"lazy\" decoding=\"async\"  > <\/picture><br \/>\nDownload<br \/>\nInstantly<\/td>\n<td style=\"width: 30%; height: 10px; text-align: center;\"><picture><source srcset=\"https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/3-4.webp 128w, https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/3-4-100x100.png 100w\" sizes=\"auto, (max-width: 60px) 100vw, 60px\" type=\"image\/webp\"><img src=\"https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/3-4.png\" height=\"60\" width=\"60\" srcset=\"https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/3-4.png 128w, https:\/\/codeshoppy.com\/shop\/wp-content\/uploads\/2020\/11\/3-4-100x100.png 100w\" sizes=\"auto, (max-width: 60px) 100vw, 60px\" class=\"alignnone wp-image-21591 sp-no-webp\" alt=\"\" loading=\"lazy\" decoding=\"async\"  > <\/picture><br \/>\nOnline<br \/>\nSupport<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":21115,"template":"","meta":{"_joinchat":[]},"product_brand":[],"product_cat":[17,18],"product_tag":[896,897,895,898,899,889,891,892,894,893],"class_list":{"0":"post-144","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-android","7":"product_cat-php","8":"product_tag-creativefinalyearprojectcs","9":"product_tag-csefinalyearprojectssourcecode","10":"product_tag-finalyearcsstudent","11":"product_tag-finalyearprojectitstudents","12":"product_tag-finalyearprojectideaswebdevelopment","13":"product_tag-innovativeprojectideas","14":"product_tag-miniprojectprice","15":"product_tag-miniprojectscse3rdyear","16":"product_tag-projectscsefinalyear","17":"product_tag-projectsengineeringcse","19":"first","20":"instock","21":"shipping-taxable","22":"purchasable","23":"product-type-variable"},"_links":{"self":[{"href":"https:\/\/codeshoppy.com\/shop\/wp-json\/wp\/v2\/product\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codeshoppy.com\/shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/codeshoppy.com\/shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/codeshoppy.com\/shop\/wp-json\/wp\/v2\/media\/21115"}],"wp:attachment":[{"href":"https:\/\/codeshoppy.com\/shop\/wp-json\/wp\/v2\/media?parent=144"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/codeshoppy.com\/shop\/wp-json\/wp\/v2\/product_brand?post=144"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/codeshoppy.com\/shop\/wp-json\/wp\/v2\/product_cat?post=144"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/codeshoppy.com\/shop\/wp-json\/wp\/v2\/product_tag?post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}