Journal on Communications ›› 2023, Vol. 44 ›› Issue (8): 155-167.doi: 10.11959/j.issn.1000-436x.2023161
• Papers • Previous Articles
Zhen CHEN1,2, Wenchao QI1, Taiyu BAO1, Limin SHEN1,2
Revised:
2023-07-27
Online:
2023-08-01
Published:
2023-08-01
Supported by:
CLC Number:
Zhen CHEN, Wenchao QI, Taiyu BAO, Limin SHEN. Data poisoning attack detection approach for quality of service aware cloud API recommender system[J]. Journal on Communications, 2023, 44(8): 155-167.
"
方法 | 随机攻击 | 潮流攻击 | 均值攻击 | ||||||||
准确率 | 召回率 | F1值 | 准确率 | 召回率 | F1值 | 准确率 | 召回率 | F1值 | |||
NQI-N | 0.565 | 0.500 | 0.529 | 0.617 | 0.667 | 0.635 | 0.577 | 0.594 | 0.580 | ||
NQI-S | 0.841 | 0.817 | 0.829 | 0.927 | 0.951 | 0.941 | 0.902 | 0.947 | 0.927 | ||
NQI-W | 0.972 | 0.951 | 0.972 | 0.941 | 0.918 | 0.928 | 0.958 | 0.922 | 0.948 | ||
NQI-NS | 0.554 | 0.482 | 0.512 | 0.524 | 0.584 | 0.552 | 0.590 | 0.549 | 0.552 | ||
NQI-NW | 0.594 | 0.569 | 0.573 | 0.561 | 0.538 | 0.545 | 0.561 | 0.527 | 0.548 | ||
NQI-SW | 0.958 | 0.945 | 0.950 | 0.932 | 0.910 | 0.924 | 0.945 | 0.962 | 0.955 | ||
NQI |
"
方法 | 随机攻击 | 潮流攻击 | 均值攻击 | ||||||||
准确率 | 召回率 | F1值 | 准确率 | 召回率 | F1值 | 准确率 | 召回率 | F1值 | |||
NQI-N | 0.732 | 0.754 | 0.742 | 0.695 | 0.752 | 0.617 | 0.715 | 0.744 | 0.729 | ||
NQI-S | 0.941 | 0.964 | 0.955 | 0.849 | 0.869 | 0.854 | 0.874 | 0.832 | 0.857 | ||
NQI-W | 0.964 | 0.970 | 0.966 | 0.957 | 0.922 | 0.941 | 0.958 | 0.967 | 0.962 | ||
NQI-NS | 0.533 | 0.630 | 0.574 | 0.585 | 0.562 | 0.542 | 0.523 | 0.583 | 0.554 | ||
NQI-NW | 0.583 | 0.659 | 0.611 | 0.570 | 0.551 | 0.561 | 0.614 | 0.655 | 0.639 | ||
NQI-SW | 0.961 | 0.957 | 0.958 | 0.953 | 0.948 | 0.955 | 0.938 | 0.920 | 0.928 | ||
NQI |
[1] | GONG W W , ZHANG X Y , CHEN Y F ,et al. DAWAR:diversity-aware Web APIs recommendation for mashup creation based on correlation graph[C]// Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval. New York:ACM Press, 2022: 395-404. |
[2] | QI L Y , LIN W M , ZHANG X Y ,et al. A correlation graph based approach for personalized and compatible Web APIs recommendation in mobile APP development[J]. IEEE Transactions on Knowledge and Data Engineering, 2023,35(6): 5444-5457. |
[3] | CHEN Z , PAN M S , HE P F ,et al. Context and auto-interaction are all you need:towards context embedding based QoS prediction via automatic feature interaction for high quality cloud API delivery[J]. Future Generation Computer Systems, 2022,128: 265-281. |
[4] | SHU Y J , ZHANG J H , ZHANG W E ,et al. IQSrec:an efficient and diversified skyline services recommendation on incomplete QoS[J]. IEEE Transactions on Services Computing, 2023,16(3): 1934-1948. |
[5] | CAO B , LIU J , WEN Y ,et al. QoS-aware service recommendation based on relational topic model and factorization machines for IoT mashup applications[J]. Journal of Parallel and Distributed Computing, 2019,132: 177-189. |
[6] | 陈真, 乞文超, 贺鹏飞 ,等. 云应用程序编程接口安全研究综述:威胁与防护[J]. 电子与信息学报, 2023,45(1): 371-382. |
CHEN Z , QI W C , HE P F ,et al. A survey for cloud application programming interface security:threats and protection[J]. Journal of Electronics & Information Technology, 2023,45(1): 371-382. | |
[7] | ZHENG Z B , LI X L , TANG M D ,et al. Web service QoS prediction via collaborative filtering:a survey[J]. IEEE Transactions on Services Computing, 2022,15(4): 2455-2472. |
[8] | YE F H , LIN Z W , CHEN C ,et al. Outlier-resilient Web service QoS prediction[C]// Proceedings of the Web Conference 2021. New York:ACM Press, 2021: 3099-3110. |
[9] | MANIKRAO U S , PRABHAKAR T V . Dynamic selection of Web services with recommendation system[C]// Proceedings of International Conference on Next Generation Web Services Practices. Piscataway:IEEE Press, 2005: 117-121. |
[10] | RAN S P . A model for Web services discovery with QoS[J]. ACM SIGecom Exchanges, 2003,4(1): 1-10. |
[11] | YANG J , CHEN Y , RAHARDJA S . Neighborhood representative for improving outlier detectors[J]. Information Sciences, 2023,625: 192-205. |
[12] | BURRA V B , PACHALA S . An improved proxy re-encryption scheme using resource optimization and authentication protocol[J]. International Journal of System Assurance Engineering and Management, 2023:doi.org/10.1007/s13198-022-01809-9. |
[13] | GUPTA P , YADAV K , GUPTA B B ,et al. A novel data poisoning attack in federated learning based on inverted loss function[J]. Computers & Security, 2023,130: 1-8. |
[14] | ZHANG H X , WANG D Y , ZHANG W ,et al. QoS prediction in intelligent edge computing based on feature learning[J]. Journal of Cloud Computing, 2023,12(1): 1-16. |
[15] | LI J H , WU H , CHEN J P ,et al. Topology-aware neural model for highly accurate QoS prediction[J]. IEEE Transactions on Parallel and Distributed Systems, 2022,33(7): 1538-1552. |
[16] | ZHU J , LI B , WANG J ,et al. BGCL:bi-subgraph network based on graph contrastive learning for cold-start QoS prediction[J]. Knowledge-Based Systems, 2023,263: 1-11. |
[17] | HA J , PARK S . NCMD:Node2vec-based neural collaborative filtering for predicting MiRNA-disease association[J]. IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2022,20(2): 1257-1268. |
[18] | XIA D W , ZHENG Y L , BAI Y ,et al. A parallel grid-search-based SVM optimization algorithm on Spark for passenger hotspot prediction[J]. Multimedia Tools and Applications, 2022,81(19): 27523-27549. |
[19] | YANG Y T , ZHENG Z B , NIU X D ,et al. A location-based factorization machine model for Web service QoS prediction[J]. IEEE Transactions on Services Computing, 2021,14(5): 1264-1277. |
[20] | MEHTA B , NEJDL W . Unsupervised strategies for shilling detection and robust collaborative filtering[J]. User Modeling and User-Adapted Interaction, 2009,19(1): 65-97. |
[21] | YANG F , GAO M , YU J L ,et al. Detection of shilling attack based on Bayesian model and user embedding[C]// Proceedings of 2018 IEEE 30th International Conference on Tools with Artificial Intelligence. Piscataway:IEEE Press, 2018: 639-646. |
[22] | ZHOU Q , WU J , DUAN L . Recommendation attack detection based on deep learning[J]. Journal of Information Security and Applications, 2020,52: 1-13. |
[23] | 郝耀军, 张付志 . 基于深度自动编码器的托攻击集成检测方法[J]. 计算机工程与应用, 2019,55(1): 9-22. |
HAO Y , ZHANG F . Ensemble detection method for shilling attacks based on deep sparse autoencoder[J]. Computer Engineering and Applications, 2019,55(1): 9-22. | |
[24] | MAATEN L , HINTON G . Visualizing data using t-SNE[J]. Journal of Machine Learning Research, 2008,9: 2579-2605. |
[1] | Xiaoxue GONG, Jiahao PANG, Qihan ZHANG, Changle XU, Wenshuai QIN, Lei GUO. Machine learning-based detection, identification and restoration method of jamming attacks in optical networks [J]. Journal on Communications, 2023, 44(7): 159-170. |
[2] | Zhen CHEN, Wenhui CHEN, Xiaowei LIU, Dianlong YOU, Linlin LIU, Limin SHEN. Functional complementarity relationship enhanced cloud API recommendation method [J]. Journal on Communications, 2023, 44(6): 125-137. |
[3] | Yuancheng LI, Yongtai QIN. Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform [J]. Journal on Communications, 2023, 44(5): 181-192. |
[4] | Jianxun LIU, Linghang DING, Guosheng KANG, Buqing CAO, Yong XIAO. Joint QoS prediction for Web services based on deep fusion of features [J]. Journal on Communications, 2022, 43(7): 215-226. |
[5] | Damin ZHANG, Yi WANG, Chengcheng ZOU, Peiwen ZHAO, Linna ZHANG. Resource allocation strategies for improved mayfly algorithm in cognitive heterogeneous cellular network [J]. Journal on Communications, 2022, 43(6): 156-167. |
[6] | Lixia XIE, Xueou LI, Hongyu YANG, Liang ZHANG, Xiang CHENG. Multi-stage detection method for APT attack based on sample feature reinforcement [J]. Journal on Communications, 2022, 43(12): 66-76. |
[7] | Xueyuan DUAN, Yu FU, Kun WANG, Bin LI. LDoS attack detection method based on simple statistical features [J]. Journal on Communications, 2022, 43(11): 53-64. |
[8] | Wei SUN,Peng ZHANG,Yongquan HE,Lichao XING. Attack detection method based on spatiotemporal event correlation in intranet environment [J]. Journal on Communications, 2020, 41(1): 33-41. |
[9] | Gang LI,Zhijun WU. Task scheduling algorithm for system-wide information management based on multiple QoS constraints [J]. Journal on Communications, 2019, 40(7): 27-37. |
[10] | Julong LAN,Xueshuai ZHANG,Yuxiang HU,Penghao SUN. Software-defined networking QoS optimization based on deep reinforcement learning [J]. Journal on Communications, 2019, 40(12): 60-67. |
[11] | Chuanhuang LI,Yan WU,Zhengzhe QIAN,Zhengjun SUN,Weiming WANG. DDoS attack detection and defense based on hybrid deep learning model in SDN [J]. Journal on Communications, 2018, 39(7): 176-187. |
[12] | Weiwei XIA,Zhaoming DING,Lianfeng SHEN. Joint admission control algorithm based on load transfer in heterogeneous networks [J]. Journal on Communications, 2018, 39(5): 34-47. |
[13] | Jie WANG,Lili YANG,Min YANG. Multitier ensemble classifiers for malicious network traffic detection [J]. Journal on Communications, 2018, 39(10): 155-165. |
[14] | Zhuo-xiong PEI,Xing-hua LI,Hai LIU,Kai-yue LEI,Jian-feng MA,Hui LI. Anonymizing region construction scheme based on query range in location-based service privacy protection [J]. Journal on Communications, 2017, 38(9): 125-132. |
[15] | Ming HE,Wei-shi LIU,Jiang ZHANG. Association rules recommendation algorithm supporting recommendation nonempty [J]. Journal on Communications, 2017, 38(10): 18-25. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|