Biometric Technology Today, Vol. 2025 No. 1 (0): Theme: The Adaptive Biometric Technology: Innovations in AI, Security, Data Mining, and Network Optimization, Theme: Adaptive Biometric Technology: Innovations in AI, Security, Data Mining, and Network Optimization

Detection of Malicious Attacks in Mobile Operator Traffic Mobile Operator Traffic Recommendation System Based on Graph Convolutional Neural Networks

Authors

  • Kun Wu , China Mobile Information Technology Co., Ltd.
  • Ji Bin Wang , China Mobile Information Technology Co., Ltd.
  • Yuan Zhen Wei , China Mobile Information Technology Co., Ltd.
  • Runbo Zhang Bo , China Mobile Information Technology Co., Ltd.
  • Qing Yuan Hu , China Mobile Information Technology Co., Ltd.
  • Si Di Li China Mobile Information Technology Co., Ltd.

Keywords:

Attack Detection, Common Access Injection Attack, Recommender Systems, Graph Convolutional Neural Networks, Convolutional Neural Networks, Integration Methods

Abstract

Mobile operators' traffic recommendation system is open to all Internet users, which leads to illegal manipulation of rating data through malicious interference and intentional attacks by unscrupulous users using system design flaws, thus affecting the recommendation results and seriously jeopardizing the security of recommendation services. Most of the existing detection methods are based on manually constructed features extracted from the rating data for TO attack detection, which is difficult to adapt to more complex common access injection attacks, and manually constructed features are time-consuming and lack of differentiation ability, while the scale of the attack behavior is much smaller than that of the normal behavior, which brings unbalanced data problems to the traditional detection methods. Therefore, in this paper, we propose a stacked multilayer graph convolutional neural network to learn the multi-order interaction behavior information between users and items end-to-end to obtain user embeddings and item embeddings, which are used as the attack detection features, and a convolutional neural network is used as the base classifier to realize the deep behavioral feature extraction, and combined with the integrated method to detect the attacks. The experimental results on real datasets show that compared with the popular malicious attack detection methods for recommender systems, the proposed method has a better detection effect on the co-access injection attack and overcomes the problem of unbalanced data to some extent.

Downloads

Published

2025-06-11

Issue

Section

Theme: Adaptive Biometric Technology: Innovations in AI, Security, Data Mining, and Network Optimization