<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Method of Detecting Bot Networks Based on Graph Clustering in the Recommendation System of Social Network</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yelyzaveta</forename><surname>Meleshko</surname></persName>
							<email>elismeleshko@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Central Ukrainian National Technical University</orgName>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Universytetskyi</orgName>
								<address>
									<addrLine>prosp</addrLine>
									<postCode>25006</postCode>
									<settlement>Kropyvnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>2, Kyrpychova str</addrLine>
									<postCode>61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Yakymenko</surname></persName>
							<email>m.yakymenko@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Central Ukrainian National Technical University</orgName>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Universytetskyi</orgName>
								<address>
									<addrLine>prosp</addrLine>
									<postCode>25006</postCode>
									<settlement>Kropyvnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Serhii</forename><surname>Semenov</surname></persName>
							<email>s_semenov@ukr.net</email>
							<affiliation key="aff2">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>2, Kyrpychova str</addrLine>
									<postCode>61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Method of Detecting Bot Networks Based on Graph Clustering in the Recommendation System of Social Network</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">0848911447141D72C6EF56017F6E6CC9</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T11:51+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>recommendation systems</term>
					<term>data analysis</term>
					<term>clustering</term>
					<term>information attacks</term>
					<term>bot networks</term>
					<term>graphs</term>
					<term>algorithms</term>
					<term>computer simulation</term>
					<term>social networks</term>
					<term>websites</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper proposes a method for detecting a network of bots in the recommendation system based on graph clustering and analysis of user actions. This method is proposed to be used if there are signs of an attack on the recommendation system and a set of probable targets of the attack is revealed. A series of experiments was carried out to test the effectiveness of the proposed method. The input data for the experiments were generated in the developed software simulation model of users and items of the recommendation system that made it possible to simulate the influence of external destabilizing factors on the system such as information attacks. A subsystem of information security of the recommendation system has been developed. Such subsystem consists of a method of detecting an information attack on the recommendation system based on trend analysis in item ratings and a method of detecting bot networks in the recommendation system based on graph clustering and user action analysis. Also, appropriate algorithms have been developed.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Most often information attacks on recommendation systems are carried out for marketing purposes in order to increase the ratings of the attacking party's products or decrease the ratings of competitors' products <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref>. Also attacks on recommendation systems may also be aimed at propagating informational influences during informational conflicts, e.g., for political purposes. Various information influences are often carried out through social networks <ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref>. Recommendation systems as their components have become one of the targets for information attacks in order to implement such influences <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref>. By successfully attacking a social network recommendation system or news aggregator one can change the content and order in which items of news feed are displayed to system users. It can be used not only for marketing but also for political or fraudulent purposes. To implement attacks on recommendation systems bot networks are used, since only a certain set of profiles in the system can influence recommendations formation by their joint actions <ref type="bibr">[1-6, 14, 15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1.">Related Works and Problem Statement</head><p>Mostly in existing studies <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref> it is proposed to consider the detection of an information attack on the recommendation system as identical to the detection of bot profiles, and for detecting a bot network, all user profiles are clustered based on their statistics by non-hierarchical methods (for example, k-means clustering). After such clustering bots and authentic users get into different clusters.</p><p>Since the detection of bot profiles is quite a resource-intensive task, this paper proposes to split the task of protecting the recommendation system from information attacks into two parts: 1) detection of attack signs and 2) detection and neutralization of bot profiles.</p><p>Attack detection can be a less resource-intensive task if it will be realized as tracking the dynamics of ratings of system items (all ratings or only critical ones from the point of view of information security). For example, if the ratings of items to protect start to change rapidly, and new ratings that lead to changes in ratings do not match previous average ratings of these items, you should check for bots among users who have started making such ratings. This approach will reduce the number of user profile checks. First, since they will need to be checked only if an attack is suspected. Secondly, because it will be necessary to check the profiles of not all users, but only those who carry out suspicious actions.</p><p>If in the system items with an abnormal change in rating trends are detected (that could hypothetically be the result of a botnet attack), the next logical step is to try to identify user profiles that influenced this change and try to find out if they are connected to a coordinated network or networks.</p><p>It is natural that changes in trends in the ratings of items are influenced by all users who gave them ratings equal to the targethigh if the item's ratings increased or low if the item's ratings decreased. The set of such users is easily identified by simple queries to the recommendation system database. But it is much more difficult to determine which user profiles are really part of the botnet and perform coordinated actions with other members of the botnet and who simply gave a rating that corresponded to their preferences.</p><p>Thus, the purpose of this work is to develop а method of detecting bot networks in the recommendation system of social network, which could be used only after detecting signs of an attack to check only those user profiles who interacted with possible attack objects.</p><p>The problem of botnet revealing among the profiles of system users can be reduced to the problem of finding a subgraph in the social graph of the recommendation system. The vertices in such a subgraph will be user profiles linked by some joint actions that influenced changes in rating trends of all or most items probable targets of the information attack <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b17">18]</ref>. Therefore, to develop a method for detecting a bot network we decided to use methods of graph clustering.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Development of a method for detecting bot networks in the recommendation system 2.1. Detection of signs of information attacks on the recommendation system</head><p>Since it is proposed in this paper to split the problem of protecting the social network recommendation system from information attacks into two parts: detecting signs of attack, searching for bot profiles, we will first consider how to solve the first problem before developing a method for solving the second problem.</p><p>In <ref type="bibr" target="#b18">[19]</ref> a method to determine the set of probable goals of the information attack of the bot network by analyzing the trends of ratings of items of the recommendation system was proposed. Let's consider the basic principles of this method.</p><p>The set of possible targets of the attack will be denoted as G.</p><p>The presence of an information attack on the recommendation system causes a change in the ratings of a group of items (increases or decreases them), but the change in the ratings of items is not a sufficient reason to think that there is an attack, since ratings may change due to the actions of authentic users. Therefore, a number of additional features which may indicate an information attack have been selected. A set of indicators to determine the presence or absence of an information attack on the item of the recommendation system was proposed as follows:</p><p>𝑄 𝑎,𝑖 = {𝑡𝑟, 𝑝𝑟, 𝑑 𝑟 , 𝑑 𝑡 , 𝑛 𝑟 , 𝑛 𝑡𝑟 , 𝑛 𝑟𝑒𝑐 }, (1) where tris a trend of rating dynamics of item i that can take the following values {-1, 0, 1}respectively "rating downward trend", "no change" and "upward trend"; 𝑝𝑟is a prediction for the trend of the rating dynamics of item i, for example, based on the Hurst exponent <ref type="bibr" target="#b19">[20]</ref>; 𝑑 𝑟is a variance of ratings of item 𝑖; 𝑑 𝑡is a variance of time of grading for item 𝑖; 𝑛 𝑟is a number of ratings of item 𝑖 at the studied time interval; 𝑛 𝑡𝑟is a number of target ratings for item 𝑖 at the studied time interval; 𝑛 𝑟𝑒𝑐is a number of gettings of item 𝑖 into user recommendation lists at the studied time interval.</p><p>We will assume that the attack on the recommendation system occurs when the ratings of one o r more items of the system are purposefully changed by the joint actions of a group of system user profiles. Herewith the size of damage from the attack does not always depend on the number of items. Successful change of the ratings of even one item can have great consequences if the item is important and it is, for example, in the social, political or medical sector etc.</p><p>It is proposed to determine the presence and type of attack according to the following rules: Rule 1. If the item has any 5 signs from the data: the trend of increasing the rating 𝑡𝑟 𝜏 = 1, 𝐻 &gt; 0.73, 𝑑 𝜏 ≤ 𝑑 𝜏,𝑎𝑣𝑟 , 𝑑 𝑡 ≤ 𝑑 𝑡,𝑎𝑣𝑟 , 𝑛 𝑟 &gt; 𝑛 𝑟,𝑎𝑣𝑟 , 𝑛 𝑡𝑔 &gt; 𝑛 𝑡𝑔,𝑎𝑣𝑟 , 𝑛 𝑟𝑒𝑐 &gt; 𝑛 𝑟𝑒𝑐,𝑎𝑣𝑟 , then we believe that there is a high probability of a rating upgrade attack for this item.</p><p>Rule 2. If the item has any 5 signs from the data: the trend of decreasing the rating 𝑡𝑟 𝜏 = −1, 𝐻 &gt; 0.73, 𝑑_𝜏 ≤ 𝑑 𝜏,𝑎𝑣𝑟 , 𝑑 𝑡 ≤ 𝑑 𝑡,𝑎𝑣𝑟 , 𝑛 𝑟 &gt; 𝑛 𝑟,𝑎𝑣𝑟 , 𝑛 𝑡𝑔 &gt; 𝑛 𝑡𝑔,𝑎𝑣𝑒𝑟 , 𝑛 𝑟𝑒𝑐 &lt; 𝑛 𝑟𝑒𝑐,𝑎𝑣𝑟 , then we believe that there is a high probability of a rating downgrade attack for this item.</p><p>Once the attack on the recommendation system is detected and the set of probable targets of bots 𝐺 is created, it will be logical to investigate the profiles of all users who influenced the change of item rating trends from this set 𝐺. And in this work, it is precisely such actions that are proposed to be done for the search of bot profiles.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Identification of bot profiles in the recommendation system</head><p>To solve the problem of identification of bot profiles in this paper a method based on graph clustering and analysis of user actions was developed using the coefficients of "distrust". The method consists of the following stages:</p><p>Stage 1. Create a set of suspicious user profiles 𝑆, in which we place the profiles that gave the target estimates 𝑟 𝑡 for items from the set 𝐺.</p><p>Stage 2. Assign to each user from the set 𝐺 label :suspicious and coefficient of distrust calculated by the next formula:</p><formula xml:id="formula_0">𝑘 𝑑,𝑖 = ∑ 𝑗∈𝐺 𝐸 𝑟 𝑡,𝑖,𝑗 𝑛 𝑔 ,<label>(2)</label></formula><p>where 𝐸 𝑟 𝑡,𝑖,𝑗is a presense of target rating 𝑟 𝑡 from user 𝑖 for item 𝑗 belonging to the set 𝐺 of probable targets of the attack, takes values 1, if target rating exists and 0in the absence of such a rating from user 𝑖 for item 𝑗; 𝑛 𝑔is a number of items in the set 𝐺 of probable targets of the attack. Stage 3. For each pair of users 𝑖 1 and 𝑖 2 from the set 𝑆, where 𝑘 𝑑,𝑖1 ≥ 𝑞 and 𝑘 𝑑,𝑖2 ≥ 𝑞, create an edge between them with a label :BotNet.</p><p>Stage 4. Perform graph clustering for a subgraph containing vertices with labels :User and :suspicious and edges with label :BotNet. The results of such clustering will be as followsall bots will get into one large cluster, if there is one botnet, or to several large clustersif there are several botnets; authentic users will get into different clusters, each of these clusters will contain one user or a small number of users. It is also possible that a certain number of authentic users will get into the cluster with bots, or a group of similar and active authentic users will create a separate cluster if their actions shift the ratings of some items.</p><p>Stage 5. Define the largest clusters consisting of (𝑁 𝑐𝑟 -𝑒) users, where 𝑁 𝑐𝑟is a minimum number of users that may affect the performance of the recommendation system (depends on the parameters of a particular system), 𝑒is an approximate value of the error when dividing user profiles into clusters. We consider such cluster (or clusters) as a possible bot network (bot networks). For users who do not get into these clusters, remove the edges with the label :BotNet. Users who got to the subgraph BotNet needed to be further checked analyzing the statistical characteristics of their profiles, for example, using the method proposed in the previous section using neural networks <ref type="bibr" target="#b20">[21]</ref>. Also for additional check of profiles from the subgraph BotNet one can search for certain features characteristic of bots, for example, poorly completed personal data or extremely high activity (the characteristics of bots depend on the specific system and can become known in the process of collecting statistics during its operation). One of the common features of bots for many systems can be: the difference between the values of the variance of ratings and the variance of time intervals between ratings in the profiles of bots from the average values of the corresponding variances in the profiles of system users. For a particular system, the features of bots can be: features of profile registration, features of filling the profile with personal information, style of writing and content of comments, user friends list etc. After checking the statistics of individual user profiles that got into the subgraph BotNet, it have to be corrected, removing from it users identified by statistics as authentic. If there is a cluster in which all users are recognized as authenticit should cease to be considered a bot network.</p><p>Stage 6. Correct the set 𝐺 after analyzing the user ratings from the subgraph BotNet. It is necessary to check which items users from the botnet have coordinately targeted. Remove from 𝐺 items that did not receive at all or received a small percentage of target ratings from users identified as bots. Add to the set 𝐺 items that have received target scores from all bots (or a large percentage of bots).</p><p>The research to the most well-known and frequently used methods of graph clustering was conducted <ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref><ref type="bibr" target="#b25">[26]</ref><ref type="bibr" target="#b26">[27]</ref>. Consider the methods of graph clustering that can be used in the proposed method of detecting a network of bots and the basic principles of their operation.</p><p>Louvain (or Multilevel) methodgraph clustering method based on multilevel optimization of the modularity function <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b27">28]</ref>. Modularity is a numerical characteristic that describes the strength of division of a graph into modules, is one measure of the structure of networks or graphs <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b24">25,</ref><ref type="bibr" target="#b25">26]</ref>. To assess the modularity the next formula can be used:</p><formula xml:id="formula_1">𝑄 = 1 2𝑛 𝑒 ∑ 𝑖𝑗 (𝐴 𝑖𝑗 − 𝑑 𝑖 𝑑 𝑗 2𝑛 𝑒 ) 𝛿(𝐶 𝑖 , 𝐶 𝑗 ),<label>(3)</label></formula><p>where 𝑛 𝑒is a number of edges in the graph; 𝐴is an adjacency matrix of the graph; 𝑑 𝑖is a number of edges adjacent to the vertex 𝑖; 𝑑 𝑗is an number of edges adjacent to the vertex 𝑗; 𝛿(𝐶 𝑖 , 𝐶 𝑗 )is a delta function equal to one, if 𝐶 𝑖 = 𝐶 𝑗 and zero otherwise. This value is equal to the difference between the number of edges within the cluster during the current splitting and the number of edges if they were randomly generated <ref type="bibr" target="#b25">[26]</ref>.</p><p>The value of modularity shows the severity of clusters, it will be:  equal to one for a complete graph in which all vertices are placed in one cluster;  equal to zero for division into clusters, in which each vertex is in a separate cluster;  for unsuccessful partitions modularity can take a negative value. In essence, the value of modularity can be used to assess the quality of splitting graphs into clusters. Qualitative partitioning is characterized by the fact that the number of internal links within each cluster must be greater than the number of its external links.</p><p>The value of modularity characterizes not how much for this partition intra-cluster bonds are denser than inter-cluster, but how much they are denser compared to some initial density. Therefore, there is a comparison with the "null hypothesis", which is that the arcs are distributed randomly, that is, there are no patterns in the distribution of the density of arcs within the graph.</p><p>The principle of graph clustering algorithms based on modularity optimization is that at each step of the algorithm each cluster vertex is somehow matched to a cluster, the modularity value is calculated and the graph vertices are redistributed between clusters so as to increase the modularity value. The operation of such algorithms stops when it is no longer possible to improve the value of modularity.</p><p>The Louvain method consists of two parts. The first part is a greedy optimization of modularity. The second part of the method is as follows: a new graph is created with metapeaks in the form of found clusters and edges with the total weight of all edges going from one cluster to another (loops with total weights of connections inside the cluster are also created). Such a graph is called a metagraph. The algorithm is restarted on a new graph. This is one of the most well-known methods due to its speed.</p><p>LabelPropagation methodgraph clustering method based on graph labeling. It divides the graph into clusters as follows: each vertex in the graph belongs to the cluster to which most of its neighbors belong, if there are several such clusters, then one of them is chosen by chance <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b27">28]</ref>. This method is based on the idea that the vertex belongs to the cluster to which the largest number of its neighboring vertices belongs. Consider the principle of operation of this method. At the initial point in time, all vertices are assigned a separate cluster. Each vertex receives a label or color of the corresponding cluster. Then, for each vertex, it is checked which clusters its neighbors belong to and the cluster membership is redistributed. Due to coincidences, it is important to change the order of vertex traversal at each iteration. The algorithm ends when there is nothing to changeall vertices belong to the same clusters as most of their neighbors. To improve the results, one can use the following trickrun the algorithm several times, save the result of its work each time and choose the best option for splitting the graph. The main advantage of this algorithm is almost linear complexity. The disadvantage of the algorithm is that noisy graphs often combine all vertices into one cluster or a small number of clusters.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Experiments to test the effectiveness of the proposed method on a software model</head><p>A series of experiments was carried out to test the developed method of detecting a network of bots. Since there is no information on bot profiles in the available open datasets for testing recommendation systems, it is necessary to create a software simulation model of users and recommendation system items to generate datasets that will also contain bot profiles.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.1.">Software simulation model of users and items of the recommendation system</head><p>A software simulation model of users and items of the recommendation system with the ability to simulate information attacks has been developed. Let's consider the basic principles of work of the developed software simulation model of users and items of the recommendation system.</p><p>The main type of attacks on recommendation systems are profile injection attacks, which involve the creation of a number of bot profiles (bot networks) that, by coordinated actions, change the ratings and frequency of getting target items into recommendation lists.</p><p>A study of existing models of attacks on recommendation systems was carried out in the paper. The bot profile can contain the following types of ratings:  Ratings for items from the set 𝐼 𝑓 to simulate the actions of real users. The attacker doesn't try to change these ratings, but instead tries to find values for them that are as close as possible to the real target group of users he seeks to influence.  Ratings for items from the set 𝐼 𝑡𝑖 , these are the maximum (or close to them) ones in the system for target items for which the attacker seeks to increase the rating.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Ratings for items from the set 𝐼 𝑡𝑑 , are the minimum (or close to them) ones in the system for target items for which the attacker seeks to decrease the rating. The number of target items in the bot can vary from 1 to 𝐾 and be contained only in the set 𝐼 𝑡𝑖 or only in the set 𝐼 𝑡𝑑 , or both, and the number of items to fill the profilefrom 0 to 𝑁.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Random Attack</head><p>In bot profiles the set 𝐼 𝑓 will be filled with ratings for randomly selected items. Ratings for selected items will also be selected randomly, but in such way that they are close to the global average score in the system, for example, a normal distribution with a mathematical expectation equal to the global average will be used. The target item will be given the maximal 𝑟 𝑚𝑎𝑥 or minimal rating 𝑟 𝑚𝑖𝑛 , depending on the targets of the attack. The knowledge and effort required to carry out such an attack is quite minimalthe global average score in many systems can be easily learned directly or through indirect data. This attack is not very effective.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Average Attack</head><p>Uses the individual averages of each item's ratings to create the set 𝐼 𝑓 . More information needs to be gathered for this attack. However, an average attack can be successful even with a small set of elements in 𝐼 𝑓 , that reduces the amount of information needed to collect. But the cost of such a reduction in the required data will be a large number of profiles with almost the same set of rated elements that will, of course, be easy to detect. This attack is more effective than random. But it is practically ineffective for collaborative filtering algorithms based on the neighborhood model of item-based type.</p><p>The average attack requires a relatively large amount of knowledge about the statistics of the actions of real users in the system. Reasonable defense of the recommendation system from such attacks will make it difficult for the attacker to collect the necessary data. To bypass such defense, other attacks are used, for which the requirements for the amount of knowledge are much lower.</p><p>Consider existing attacks that require less knowledge than the average attack, but work more effectively than a random attack.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Bandwagon Attack</head><p>The purpose of this attack is to associate the attacked item with a small number of items that are often rated by users (let's call them widely known). An attacker creates profiles of bots that contain a set 𝐼 𝑓 of ratings of widely known items. Such profiles are more likely to look like a large number of users, as well-known items are those that are rated by many users. Data for such an attack is quite easy to obtain. So, among the well-known items, several are chosen at random. These items are given maximum ratings along with the target item. Some of the items in the set 𝐼 𝑓 can be randomly rated, for example like in a random attack, to vary bot profiles. This is a fairly effective attack but like the average attack becomes ineffective when used against collaborative filtering based on the item-based neighborhood model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Segment Attack</head><p>The basic idea of this attack is to change the rating of the item in the target group of users with known or easily predictable preferences. The target item will be rated only in a certain segment of users, so that it gets recommendations only to them. Otherwise, if the target item gets in recommendations for users from other segments, it may start receiving low ratings from them and the number of such low ratings will be greater than artificially inflated ones. To carry out such an attack, an attacker need to find real users who belong to the target segment and collect data on the ratings that they usually give to system items. As with the bandwagon attack, it is usually determined which items in the target segment are widely known. These items are assigned the maximal rating together with the target item. To ensure maximum effect from the attack, some items for the set 𝐼 𝑓 are randomly selected and receive minimal ratings, which allows the attacker to make the bot profiles various. This attack is effective against collaborative filtering algorithms based on the item-based neighborhood model.</p><p>It should be noted that all of the attack models discussed above can be used to decrease item ratings, but there are specialized attacks that work better than others exactly to decrease ratings.</p><p>Consider attack models designed to decrease ratings of recommendation system items.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Love/Hate Attack</head><p>This attack is very simpleno knowledge to be required. The target item is given a minimal rating 𝑟 𝑚𝑖𝑛 , and the items for the set 𝐼 𝑓 are chosen randomly and receive maximal ratings 𝑟 𝑚𝑎𝑥 . Despite its extreme simplicity, this is one of the most effective downgrade attacks against collaborative filtering algorithms based on the user-based neighborhood model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Reverse Bandwagon Attack</head><p>This is variation of the above-described bandwagon attack that selects widely known items for 𝐼 𝑓 that are rated low by the vast majority of users. These items are rated low in bot profiles, and low ratings are assigned to the target item. Thus the target item begins to be associated with items that are not liked by a large number of users, and this increases the probability that low ratings will be predicted for the item and it will not be included in the lists of recommendations. Although this attack is not as effective as the average attack with a lot of knowledge for user-based systems, it is a very effective attack to downgrade against item-based systems.</p><p>Low-level attacks use widely known items to fill a bot's profile with ratings for them. In this way, an attacker can create a profile similar to the average user by examining the ratings of only widely known items.</p><p>If an attacker knows exactly which algorithm the referral system uses, he can gather more information to attack.</p><p>Thus, attacks can be classified into:  Attacks with little knowledgethis type of attack does not require detailed knowledge of the distribution of scores in the system. It requires system-independent knowledge that can be easily obtained through public sources of information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Attacks with a lot of knowledgean attacker needs to have as much knowledge as possible about the system's algorithms and the distribution of ratings of system items. For example, some attacks require the attacker to know the mean and standard deviation for each item in the system. An example of an attack with a lot of knowledge is a popular attack. Popular Attack Assume that the system uses a standard user-based collaborative filtering algorithm, where similarity between users is determined by Pearson correlation. As in the bandwagon attack, the set 𝐼 𝑓 is filled using well-known system items. However, this does not guarantee a high similarity between the bot profile and the real profiles. Therefore, the popular attack uses the average values of the ratings of selected well-known items to fill the set 𝐼 𝑓 . And in order to vary the profile data assign to some randomly selected items in 𝐼 𝑓 ratings equal to (𝑟 𝑚𝑖𝑛 + 1) or 𝑟 𝑚𝑖𝑛 , depending on whether the average rating for the item is higher or lower. This strategy will lead to positive correlations between bot profiles and authentic profiles. It doesn't take a lot of knowledge to identify well-known items, but a lot of information needs to be gathered to determine the average ratings of selected items. A popular attack can also be easily tuned for downgrade attacks. This attack can be detected by comparing profiles in the systemthe bot profiles of one bot network will be very similar.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Probe Attack</head><p>The more similar bot ratings are to those of real users, the more difficult it is to recognize bot profiles. Knowledge of the real preferences of different segments of users can be obtained from the system itself through a probe attack. To carry out this attack the attacker creates a seed profile and then uses it to obtain recommendations from the system. These recommendations are created on the basis of system information about real users, so the use of the received recommendations will allow the attacker to create bot profiles more similar to real users. The attacker can probe a small number of users to then affect a small group, as in a segmental attack, or a large partto obtain information, for example, for an average attack. An attacker needs to use only a small number of seed profiles in order for the recommendation system to provide him with the necessary information in the form of recommendations.</p><p>Our studies of models of information attacks on recommendation systems have shown that the easiest to implement and the least resource-intensive attacks are random and average ones, and the most effective and inconspicuous (although quite resource-intensive) attack is a popular attack. Other studied models of attacks in fact are their modifications, for example, designed to attack only a certain segment (segment attack), or to attack only to lower ratings (love/hate attack), or to reduce resource consumption by reducing the inconspicuous of the botnet (bandwagon attack, love/hate attack). Therefore, in the software simulation model of users and items of the recommendation network, we decided to model botnets based on three main models of attacksrandom, average and popular attack.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Types of models of profile injection attacks on recommendation systems</head><p>The proposed method of software simulation of users and items of the recommendation system consists of the following parts:  Generation of the structure of the social graph of the recommendation system <ref type="bibr" target="#b28">[29]</ref>.  Simulation of the behavior of users and bots of the recommendation system. The generation of the structure of the social graph of the recommendation system was carried out on the basis of theory complex networks <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b29">[30]</ref><ref type="bibr" target="#b30">[31]</ref><ref type="bibr" target="#b31">[32]</ref> and the Barabashi-Albert (BA) model <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b29">30]</ref>, which creates scale-free networks based on 2 conditions:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Models of profile injection attacks on recommendation systems</head><note type="other">Random</note><p>Growth. Starting with a small number of nodes 𝑛 0 , on each new time iteration one new node is added with 𝑛 links (where 𝑛 ≤ 𝑛 0 ) connecting a new node to 𝑛 different existing nodes.</p><p>Preferential attachment. Probability 𝑃 that the new node connect to some existing node 𝑖 is the higher the more connections the 𝑖-th node has:</p><formula xml:id="formula_2">𝑃 𝑖 = 𝑘 𝑖 ∑ 𝑘 𝑗 𝑗 ,<label>(4)</label></formula><p>where 𝑘 𝑖is a degree of 𝑖-th node, and the denominator calculates the sum of all degrees of existing nodes in the network.</p><p>To generate the recommendation system the following subgraphs are used: In the first iteration 𝑛 0 users are randomly selected to "create" 𝑚 0 posts. Probability post publication by some user:</p><formula xml:id="formula_3">𝑃 𝑖 = 𝑘 1𝑖 + 𝑘 2𝑖 + 𝑘 3𝑖 ∑ 𝑗 (𝑘 1𝑗 + 𝑘 2𝑗 + 𝑘 3𝑗 ) ,<label>(5)</label></formula><p>where 𝑘 1𝑖is a number of friends of 𝑖-th node, 𝑘 2𝑖is a number of subscribers of the 𝑖-th node, 𝑘 3𝑖is a number of posts of the 𝑖-th node, and the denominator calculates the sum of all these values for all existing nodes in the network. Stage 5. Subgraph Posts-Published is joined to the general graph. Stage 6. An oriented subgraph Posts-Viewed is generated based on BA. Probability the post to be reviewed:</p><formula xml:id="formula_4">𝑃 𝑖 = 𝑞 1𝑖 + 𝑞 2𝑖 + 𝑞 3𝑖 ∑ 𝑗 (𝑞 1𝑗 + 𝑞 2𝑗 + 𝑞 3𝑗 ) ,<label>(6)</label></formula><p>where 𝑞 1𝑖is a number of friends of the author of the 𝑖-th post, 𝑞 2𝑖is a number of subscribers to the author of the 𝑖-th post, 𝑞 3𝑖is a number of views of the 𝑖-th post, and the denominator calculates the sum of all these values for all existing nodes in the network. Stage 7. Subgraph Posts-Viewed is joined to the general graph. Stage 8. Subgraph Posts-Liked is generated. Probability of getting a like:</p><formula xml:id="formula_5">𝑃 𝑖 = 𝑞 1𝑖 + 𝑞 2𝑖 + 𝑞 3𝑖 + 𝑞 4𝑖 ∑ 𝑗 (𝑞 1𝑗 + 𝑞 2𝑗 + 𝑞 3𝑗 + 𝑞 4𝑗 ) ,<label>(7)</label></formula><p>where 𝑞 1𝑖is a number of friends of the author of the 𝑖-th post, 𝑞 2𝑖is a number of subscribers to the author of the 𝑖-th post, 𝑞 3𝑖is a number of views of the 𝑖-th post, 𝑞 4𝑖is a number of likes of the 𝑖-th post, and the denominator calculates the sum of all these values for all existing nodes in the network. Stage 9. Subgraph Posts-Liked is joined to the general graph. Stage 10. Subgraphs Users-Similarity, Posts-Similarity and Posts-Recommended are generated by the algorithms of the selected recommendation system.</p><p>Studies of the parameters of the generated social graphs <ref type="bibr" target="#b28">[29]</ref> (in particular such as density, diameter of a network, clustering coefficient et al.) showed their correspondence to the properties of real social networks.</p><p>Modeling of user behavior was based on the generation of a dynamic graph Users-Ratings-Items.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Stages of the developed method:</head><p>Stage 1. Initialization of user parameters and system items. Stage 2. Creating a "Seed" of social graph. Generating ratings for regular users:</p><formula xml:id="formula_6">𝑑 𝑢,𝑚 = ∑ 𝑛 𝑖=0 |𝑓 𝑢,𝑖 − 𝑓 𝑚,𝑖 | 𝑛 ,<label>(8)</label></formula><p>𝑟 𝑢,𝑚 = Ψ(5𝑑 𝑢,𝑚 + 𝑏 𝑢 + 𝑏 𝑚 ) ,</p><p>where 𝑑 𝑢,𝑚is a distance between user 𝑢 and item 𝑚 in the multidimensional space of hidden factors; 𝑛is a number of hidden factors; 𝑓 𝑢,𝑖is a i-th hidden factor of user 𝑢; 𝑓 𝑚,𝑖is a 𝑖-th hidden factor of item 𝑚; 𝑏 𝑢is a user offset in items' evaluation (level of requirements to contenct); 𝑏 𝑚is a shift of the item in obtaining ratings (content quality level); Ψ()is an function that converts the resulting fractional number into a discrete number from a set of ratings [0.5, 1.0, 1.5, 2.0, 2.5, 3.0, 3.5, 4.0, 4.5, 5.0].</p><p>Among the existing attack models for software simulation we chose random, average and popular attackssince these models are the most commonly used, universal and illustrate different attack strategies.</p><p>Generating a ratings for bots:</p><formula xml:id="formula_8">𝑟 𝑢,𝑚 = { attackPattern(), if item -"ordinary" 5.0, if item -"target" ,<label>(10)</label></formula><p>where attackPattern()is a function generating ratings for non-target items according to the type of attack model selected.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.2.">The results of experiments to verify the effectiveness of the proposed method of detecting bot networks</head><p>Data sets for experiments were generated in the developed software simulation model of the recommendation system. The format and statistical features of the data were generated as close as possible to the corresponding characteristics of MovieLens Datasets <ref type="bibr" target="#b32">[33]</ref>. Information attacks were modeled using random, average, and popular attack models <ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref>. The Label Propagation algorithm was used as a graph clustering algorithm.</p><p>In the series of experiments, 5%, 10%, 20% and 30% of bots were generated in different series, all other users of the system are authentic. In different experiments bots had different numbers of targets to attack: 1, 5, 10, 15, 20, 25, 30, 35, 40 and 45 targets. Also 20% of profiles with a high level of activity in the recommendation system were generated among authentic users. Such users gave significantly more ratings than the average user. System items were generated to belong to one of the 19 clusters.</p><p>The bot search algorithm for the studied recommendation system had the following parameters:  𝑞 = 0.05that is, the user has set target ratings of at least 5% of the items that are identified by the information security subsystem as probable targets of the attack. The threshold is small because it is not known how accurately the targets of the attack are recognized, there may be many items with the ratings that have changed naturally.</p><p> The elimination of user profiles from the BotNet subgraph is based on the values of the variance of ratings and the variance of time intervals between ratings. Authentic users who mistakenly get into the BotNet subgraph are users whose profile data satisfy the following rule:</p><p>|𝐷 𝑟 -𝐷 𝑟,𝑎𝑣𝑟 | &lt; 0.15 AND (𝐷 𝑡,𝑟 &gt; 72 AND 𝐷 𝑡,𝑟 &lt; 600), where 𝐷 𝑟is a variance of ratings in the user profile, 𝐷 𝑟,𝑎𝑣𝑟is a truncated mean variance of ratings in the system user profile (30% of the extreme values were truncated, i.e., value equal to the maximum possible percentage of bots in the system in question), 𝐷 𝑡,𝑟is a variance of time intervals between rates. The variance of ratings in the profiles of authentic users is not significantly different from the average variance (the attacker of system can not know this value, he can only estimate it, so can not accurately reproduce this characteristic when creating bot profiles). And checking the variance of time intervals between ratings is as followsusers who have too identical or too different time intervals between ratings should be considered suspicious, while the variance of time intervals between ratings of authentic users is usually in a certain range.</p><p>In the table 1 the results of a series of experiments to verify the accuracy of the developed method of identification of bot profiles are show. The following notations of attack models are used: RArandom attack, AAaverage attack, PApopular attack.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>The results of testing the accuracy of the developed method of identifying bot profiles in the recommendation system based on graph clustering and analysis of user actions for different models of attacks and different numbers of bots and attack targets To assess the quality of the developed method the following metrics were selected. Precisiona measure that characterizes how many positive triggers of the information security subsystem of bot detection are correct. It was calculated by the formula:</p><formula xml:id="formula_9">precision = 𝑡𝑝 𝑡𝑝 + 𝑓𝑝 ,<label>(11)</label></formula><p>where 𝑡𝑝is a correctly detected bot; 𝑓𝑝is an authentic user incorrectly identified as a bot.</p><p>Recall (or Sensitivity)a measure that characterizes the ability of the information security subsystem to correctly detect the profiles of bots without taking into account false positives. It was determined by the formula:</p><formula xml:id="formula_10">recall = 𝑡𝑝 𝑡𝑝 + 𝑓𝑛 (<label>12</label></formula><formula xml:id="formula_11">)</formula><p>where 𝑡𝑝is a correctly detected bot; 𝑓𝑛is a bot incorrectly identified as an authentic user. RMSEroot mean square error:</p><formula xml:id="formula_12">𝑅𝑀𝑆𝐸 = ∑ 𝑛 𝑖=1 (𝑦 ̂𝑖 − 𝑦 𝑖 ) 𝑛<label>(13)</label></formula><p>As shown by a series of experiments from Table <ref type="table">1</ref>, the precision of bot detection by the developed method in average is 0.72 for a random attack, 0.81 for an average attack, and 0.71 for a popular attack.</p><p>The accuracy of bot recognition by the developed method for the popular attack model was also investigated in more detail (Table <ref type="table">2</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>The average values of the accuracy of the developed method for different numbers of information attack targets in bots The experiments have shown that the detection precision of bots by the method developed for a popular attack in avereage is 0.71, completeness is 0.82, and RMSE is 0.22. The worst results were obtained when the target for the attack of bots was single, then the accuracy of the developed method dropped to 0.57 on average. The highest precision was observed when there were 25-30 targets of the attacks, in that case it reached a value of 0.78.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Conclusions</head><p>Method of detecting botnets in the recommendation system based on graph clustering and analysis of user actions was developed. This method allows to detect botnets and distinguish them by sets of attack objects. Also, appropriate algorithms have been developed. A subsystem of information security of the recommendation system has been developed. This subsystem consists of a method of detecting an information attack on the recommendation system based on trend analysis of item ratings and a method of detecting botnets in the recommendation system based on graph clustering and analysis of user actions. The developed information security subsystem allows providing higher robustness of the system to external destabilizing factors represented by information attacks in contrast to existing methods.</p><p>Our experiments have shown that the precision of bot detection by the developed method averages 0.72 for a random attack, 0.81 for a medium attack, and 0.71 for a popular attack. The worst results were obtained when the target for the attack of bots was single, then the accuracy of the developed method, for example, for a popular attack averages 0.57. The highest precision was observed when there were 25-30 targets of the attack and then it reached a value of 0.78 for a popular attack. In case of a successful bot attack which have shifted target ratings, the presence of a botnet (and a significant percentage of bots from it) was always detected. All user profiles identified as bots should be verified using existing bot identification methods based on statistical analysis of individual profile data. This allows to refine the results and remove from this set of user profiles those are mistakenly identified as bots.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Stage 3 . 4 .</head><label>34</label><figDesc>Simulation of time iterations. At each time iteration, a number of users, items, and bots join the model. Users and bots rate items. Stage Stopping the model and saving the resulting data set to a file.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>1) Users-Friends, Users-Followers, Posts-Published, Posts-Viewed and Posts-Likedare created by the generator of the social network graph, 2) Users-Similarity, Posts-Similarity and Posts-Recommendedare created by the recommendation system.</figDesc><table /><note>Stages of the developed method: Stage 1. A non-oriented subgraph Users-Friends is generated based on BA. Stage 2. A non-oriented subgraph Users-Followers is generated based on BA. Stage 3. Subgraphs Users-Friends and Users-Followers are combined into one graph. Stage 4. An oriented subgraph Posts-Published is generated based on modified BA.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>.1666 24.6085 0.723953 0.773611 3.9476 22.6388 0.245681</head><label></label><figDesc></figDesc><table><row><cell>No. of experiment</cell><cell>Percenta-ge of bots among the system profiles, %</cell><cell>Number of targets for each bot, pcs.</cell><cell>Attack type</cell><cell>Number % of correctly recog-nized targets,</cell><cell>Number of incorrectly recognized as targets, %</cell><cell>Precision of bot detection</cell><cell>Recall of bot detection</cell><cell>Type I errors, %</cell><cell>Type II errors, %</cell><cell>RMSE of bot recogni-tion</cell></row><row><cell>1</cell><cell>5</cell><cell>1</cell><cell>RA</cell><cell cols="7">100.000 24.1206 0.666666 0.800000 2.1052 20.0000 0.173205</cell></row><row><cell>2</cell><cell>5</cell><cell>5</cell><cell>RA</cell><cell cols="7">40.0000 22.0513 0.571428 0.800000 3.1578 20.0000 0.200000</cell></row><row><cell>3</cell><cell>5</cell><cell>10</cell><cell>RA</cell><cell cols="7">60.0000 21.0526 0.800000 0.800000 1.0526 20.0000 0.141421</cell></row><row><cell>4</cell><cell>10</cell><cell>1</cell><cell>RA</cell><cell cols="7">0.00000 22.1106 0.375000 0.600000 5.2631 40.0000 0.264575</cell></row><row><cell>5</cell><cell>10</cell><cell>5</cell><cell>RA</cell><cell cols="7">60.0000 24.1025 0.538461 0.700000 6.6666 30.0000 0.300000</cell></row><row><cell>6</cell><cell>10</cell><cell>10</cell><cell>RA</cell><cell cols="7">90.0000 21.5789 0.888888 0.800000 1.1111 20.0000 0.173205</cell></row><row><cell>7</cell><cell>20</cell><cell>1</cell><cell>RA</cell><cell cols="7">100.000 30.6532 0.692307 0.900000 4.4444 10.0000 0.223606</cell></row><row><cell>8</cell><cell>20</cell><cell>5</cell><cell>RA</cell><cell cols="7">100.000 23.5897 0.700000 0.700000 7.5000 30.0000 0.346410</cell></row><row><cell>9</cell><cell>20</cell><cell>10</cell><cell>RA</cell><cell cols="7">80.0000 18.9473 0.850000 0.850000 3.7500 15.0000 0.244948</cell></row><row><cell>10</cell><cell>30</cell><cell>1</cell><cell>RA</cell><cell cols="7">100.000 33.6683 0.823529 0.700000 3.7500 30.0000 0.300000</cell></row><row><cell>11</cell><cell>30</cell><cell>5</cell><cell>RA</cell><cell cols="7">80.0000 29.7435 0.896551 0.866666 4.2857 13.3333 0.264575</cell></row><row><cell>12</cell><cell>30</cell><cell>10</cell><cell>RA</cell><cell cols="7">80.0000 23.6842 0.884615 0.766666 4.2857 23.3333 0.316227</cell></row><row><cell cols="11">Average: 7413 5 1 AA 100.000 18.0905 0.625000 1.000000 0.0000 3.26080 0.173205</cell></row><row><cell>14</cell><cell>5</cell><cell>5</cell><cell>AA</cell><cell cols="7">100.000 21.0257 0.555555 1.000000 0.0000 4.39560 0.200000</cell></row><row><cell>15</cell><cell>5</cell><cell>10</cell><cell>AA</cell><cell cols="7">60.0000 21.5789 1.000000 1.000000 0.0000 0.00000 0.000000</cell></row><row><cell>16</cell><cell>10</cell><cell>1</cell><cell>AA</cell><cell cols="7">100.000 24.6231 0.588235 1.000000 0.0000 7.77770 0.264575</cell></row><row><cell>17</cell><cell>10</cell><cell>5</cell><cell>AA</cell><cell cols="7">60.0000 25.6410 0.900000 0.900000 1.1111 10.0000 0.141421</cell></row><row><cell>18</cell><cell>10</cell><cell>10</cell><cell>AA</cell><cell cols="7">70.0000 25.2631 0.833333 1.000000 2.2222 0.00000 0.141421</cell></row><row><cell>19</cell><cell>20</cell><cell>1</cell><cell>AA</cell><cell cols="7">100.000 25.1256 0.740740 1.000000 8.7500 0.00000 0.264575</cell></row><row><cell>20</cell><cell>20</cell><cell>5</cell><cell>AA</cell><cell cols="7">100.000 22.0512 0.850000 0.850000 3.7500 15.0000 0.244948</cell></row><row><cell>21</cell><cell>20</cell><cell>10</cell><cell>AA</cell><cell cols="7">60.0000 13.6842 0.900000 0.900000 2.5000 10.0000 0.200000</cell></row><row><cell>22</cell><cell>30</cell><cell>1</cell><cell>AA</cell><cell cols="7">60.0000 14.5728 0.909090 1.000000 4.2857 0.00000 0.173205</cell></row><row><cell>23</cell><cell>30</cell><cell>5</cell><cell>AA</cell><cell cols="7">100.000 17.9487 0.928571 0.866666 2.8571 13.3333 0.244948</cell></row><row><cell>24</cell><cell>30</cell><cell>10</cell><cell>AA</cell><cell cols="7">60.0000 11.5789 0.925925 0.833333 2.8571 16.6666 0.264575</cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="8">Average: 80.8333 20.0986 0.813037 0.945833 2.3611 6.70283 0.192739</cell></row><row><cell>25</cell><cell>5</cell><cell>1</cell><cell>PA</cell><cell cols="7">75.8793 24.1206 0.714285 1.000000 2.1052 0.00000 0.141421</cell></row><row><cell>26</cell><cell>5</cell><cell>5</cell><cell>PA</cell><cell cols="7">40.0000 17.9488 0.625000 1.000000 3.1578 0.00000 0.173205</cell></row><row><cell>27</cell><cell>5</cell><cell>10</cell><cell>PA</cell><cell cols="7">60.0000 22.6315 0.416666 1.000000 7.3684 0.00000 0.264575</cell></row><row><cell>28</cell><cell>10</cell><cell>1</cell><cell>PA</cell><cell cols="7">100.000 22.1105 0.666666 1.000000 5.5555 0.00000 0.223606</cell></row><row><cell>29</cell><cell>10</cell><cell>5</cell><cell>PA</cell><cell cols="7">80.0000 30.2564 0.900000 0.900000 1.1111 0.10000 0.141421</cell></row><row><cell>30</cell><cell>10</cell><cell>10</cell><cell>PA</cell><cell cols="7">90.0000 19.4736 0.888888 0.800000 1.1111 0.20000 0.173205</cell></row><row><cell>31</cell><cell>20</cell><cell>1</cell><cell>PA</cell><cell cols="7">0.00000 30.1507 0.000000 0.000000 6.2500 1.00000 0.500000</cell></row><row><cell>32</cell><cell>20</cell><cell>5</cell><cell>PA</cell><cell cols="7">100.000 14.3589 0.800000 0.600000 3.7500 0.40000 0.331662</cell></row><row><cell>33</cell><cell>20</cell><cell>10</cell><cell>PA</cell><cell cols="7">100.000 17.8947 0.869565 1.000000 3.7500 0.00000 0.173205</cell></row><row><cell>34</cell><cell>30</cell><cell>1</cell><cell>PA</cell><cell cols="7">100.000 28.6432 0.909090 1.000000 4.2857 0.00000 0.173205</cell></row><row><cell>35</cell><cell>30</cell><cell>5</cell><cell>PA</cell><cell cols="7">100.000 25.6410 0.900000 0.600000 2.8571 0.40000 0.374165</cell></row><row><cell>36</cell><cell>30</cell><cell>10</cell><cell>PA</cell><cell cols="7">100.000 17.3684 0.892857 0.833333 4.2857 0.16666 0.282842</cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="2">Average: 78</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>.8232 22.5498 0.715251 0.811111 3.7990 0.18889 0.246043</head><label></label><figDesc></figDesc><table /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A Comprehensive Study of Shilling Attacks in Recommender Systems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kumari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Punam</surname></persName>
		</author>
		<ptr target="https://www.ijcsi.org/articles/A-comprehensive-study-of-shilling-attacks-in-recommender-systems.php" />
	</analytic>
	<monogr>
		<title level="j">IJCSI International Journal of Computer Science Issues</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Shilling attack models in recommender system</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kaur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Goel</surname></persName>
		</author>
		<ptr target="https://ieeexplore.ieee.org/document/7824865/" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Inventive Computation Technologies (ICICT)</title>
				<meeting>the International Conference on Inventive Computation Technologies (ICICT)<address><addrLine>Coimbatore</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Shilling attacks against recommender systems: a comprehensive survey</title>
		<author>
			<persName><forename type="first">I</forename><surname>Gunes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Kaleli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bilge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Polat</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10462-012-9364-9</idno>
		<ptr target="https://doi.org/10.1007/s10462-012-9364-9" />
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence Review</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Recommender Systems Handbook</title>
		<idno type="DOI">10.1007/978-0-387-85820-3</idno>
		<ptr target="https://doi.org/10.1007/978-0-387-85820-3" />
		<editor>F. Ricci, L. Rokach, B. Shapira, P. B. Kantor</editor>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Springer</publisher>
			<pubPlace>Boston</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Effective attack models for shilling itembased collaborative filtering system</title>
		<author>
			<persName><forename type="first">B</forename><surname>Mobasher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Burke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bhaumik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Williams</surname></persName>
		</author>
		<ptr target="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.93.7759&amp;rep=rep1&amp;type=pdf#page=23" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2005 WebKDD Workshop, held in conjuction with ACM SIGKDD 2005</title>
				<meeting>the 2005 WebKDD Workshop, held in conjuction with ACM SIGKDD 2005<address><addrLine>Chicago, Illinois</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="13" to="23" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Shilling recommender systems for fun and profit</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Lam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Riedl</surname></persName>
		</author>
		<idno type="DOI">10.1145/988672.988726</idno>
		<ptr target="https://dl.acm.org/doi/10.1145/988672.988726" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th International World Wide Web Conference</title>
				<meeting>the 13th International World Wide Web Conference</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="393" to="402" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Modern information wars in social online networks</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">V</forename><surname>Kurban</surname></persName>
		</author>
		<ptr target="http://nbuv.gov.ua/UJRN/is_2016_23_15" />
	</analytic>
	<monogr>
		<title level="j">Information Society</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="85" to="90" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Social networks: models of information influence, management and confrontation</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Gubanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Novikov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">G</forename><surname>Chhartishvili</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Publishing House of Physical and Mathematical Literature</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">P</forename><surname>Horbulin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">H</forename><surname>Dodonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Lande</surname></persName>
		</author>
		<title level="m">Information operations and security of society: threats, counteraction, modeling: monograph, Intertechnology</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Ostapenko</surname></persName>
		</author>
		<title level="m">Information operations and attacks in socio-technical systems</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Hotline -Telecom</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">Information security of the state</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">M</forename><surname>Bohush</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">K</forename><surname>Yudin</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>MK-Press</publisher>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Computer modeling of dissemination of informational influences in social networks with different strategies of information distributors</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">S</forename><surname>Ulichev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ye</forename><forename type="middle">V</forename><surname>Meleshko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sawicki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Smailova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. SPIE 11176, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments</title>
				<meeting>SPIE 11176, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments<address><addrLine>Wilga, Poland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page">111761T</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness</title>
		<author>
			<persName><forename type="first">B</forename><surname>Mobasher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Burke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Bhaumik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Williams</surname></persName>
		</author>
		<idno type="DOI">10.1145/1278366.1278372</idno>
		<ptr target="https://doi.org/10.1145/1278366.1278372" />
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Internet Technology</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Preventing shilling attacks in online recommender systems</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Chirita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Nejdl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zamfir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ACM Workshop on Web Information and Data Management</title>
				<meeting>the ACM Workshop on Web Information and Data Management</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="67" to="74" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Promoting recommendations: An attack on collaborative filtering</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>O'mahony</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">J</forename><surname>Hurley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">C M</forename><surname>Silvestre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">DEXA 2002</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">A</forename><surname>Hameurlain</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Cicchetti</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Traunmüller</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="volume">2453</biblScope>
			<biblScope unit="page" from="494" to="503" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Shilling attack detection for recommender systems based on credibility of group users and rating time series</title>
		<author>
			<persName><forename type="first">W</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Qu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Cheng</surname></persName>
		</author>
		<idno type="DOI">10.1371/journal.pone.0196533</idno>
		<ptr target="https://doi.org/10.1371/journal.pone.0196533" />
	</analytic>
	<monogr>
		<title level="j">PLoS ONE</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page">e0196533</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Attack detection in recommender systems based on target item analysis</title>
		<author>
			<persName><forename type="first">W</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">S</forename><surname>Koh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Alam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Dobbie</surname></persName>
		</author>
		<ptr target="https://ieeexplore.ieee.org/document/6889419" />
	</analytic>
	<monogr>
		<title level="m">International Joint Conference on Neural Networks (IJCNN 2014)</title>
				<meeting><address><addrLine>Beijing</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="332" to="339" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Analysis of the structure of a social network in terms of information security</title>
		<author>
			<persName><forename type="middle">V</forename><surname>Ye</surname></persName>
		</author>
		<author>
			<persName><surname>Meleshko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the XVIII International scientific-practical seminar &quot;Combinatorial configurations and their applications</title>
				<meeting>the XVIII International scientific-practical seminar &quot;Combinatorial configurations and their applications<address><addrLine>Kirovograd, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016-04">Apr. 2016</date>
			<biblScope unit="page" from="93" to="97" />
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">The method of detecting information attack objects in recommendation system based on the analysis of rating trends</title>
		<author>
			<persName><surname>Ye</surname></persName>
		</author>
		<author>
			<persName><surname>Meleshko</surname></persName>
		</author>
		<idno type="DOI">10.30837/ITSSI.2020.13.052</idno>
		<ptr target="https://doi.org/10.30837/ITSSI.2020.13.052" />
	</analytic>
	<monogr>
		<title level="j">Innovative technologies and scientific solutions for industries</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">13</biblScope>
			<biblScope unit="page" from="52" to="57" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Hurst index and its hidden properties</title>
		<author>
			<persName><forename type="middle">A</forename><surname>Ju</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">M</forename><surname>Kalush</surname></persName>
		</author>
		<author>
			<persName><surname>Loginov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Siberian Journal of Industrial Mathematics</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="29" to="37" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Method of identification bot profiles based on neural networks in recommendation systems</title>
		<author>
			<persName><surname>Ye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Meleshko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Drieiev</surname></persName>
		</author>
		<author>
			<persName><surname>Drieieva</surname></persName>
		</author>
		<idno type="DOI">10.20998/2522-9052.2020.2.05</idno>
		<ptr target="https://doi.org/10.20998/2522-9052.2020.2.05" />
	</analytic>
	<monogr>
		<title level="j">Advanced Information Systems</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="24" to="28" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">A.-L</forename><surname>Barabási</surname></persName>
		</author>
		<ptr target="http://networksciencebook.com/" />
		<title level="m">Network science</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Methods for identifying communities in social graphs</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">S</forename><surname>Nykyshyn</surname></persName>
		</author>
		<ptr target="http://www.machinelearning.ru/" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">F</forename><surname>Gusarova</surname></persName>
		</author>
		<title level="m">Analysis of social networks. Basic concepts and metrics</title>
				<meeting><address><addrLine>Saint Petersburg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
		<respStmt>
			<orgName>ITMO University</orgName>
		</respStmt>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Selection of communities in the graph of interacting objects</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Kolomejchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">V</forename><surname>Poljakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Chepovskij</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Chepovskij</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamental and Applied Mathematics</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="131" to="139" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">Data Smart: Using Data Science to Transform Information into Insight</title>
		<author>
			<persName><forename type="first">J</forename><surname>Foreman</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
	<note>1st edition</note>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Survey on Social Community Detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Plantié</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Crampes</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-1-4471-4555-4_4</idno>
		<ptr target="https://doi.org/10.1007/978-1-4471-4555-4_4" />
	</analytic>
	<monogr>
		<title level="m">Social Media Retrieval, Computer Communications and Networks</title>
				<editor>
			<persName><forename type="first">N</forename><surname>Ramzan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Van Zwol</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Lee</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Clüver</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><forename type="middle">S</forename><surname>Hua</surname></persName>
		</editor>
		<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="65" to="85" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<ptr target="https://neo4j.com/docs/" />
		<title level="m">Official website of the graph database Neo4j</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note>Neo4j Documentation</note>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Computer model of virtual social network with recommendation system</title>
		<author>
			<persName><surname>Ye</surname></persName>
		</author>
		<author>
			<persName><surname>Meleshko</surname></persName>
		</author>
		<idno type="DOI">10.30837/2522-9818.2019.8.080</idno>
		<ptr target="https://doi.org/10.30837/2522-9818.2019.8.080" />
	</analytic>
	<monogr>
		<title level="j">Innovative technologies and scientific solutions for industries</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="80" to="85" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Statistical mechanics of complex networks</title>
		<author>
			<persName><forename type="first">R</forename><surname>Albert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A.-L</forename><surname>Barabási</surname></persName>
		</author>
		<idno type="DOI">10.1103/RevModPhys.74.47</idno>
		<ptr target="https://doi.org/10.1103/RevModPhys.74.47" />
	</analytic>
	<monogr>
		<title level="j">Reviews of Modern Physics</title>
		<imprint>
			<biblScope unit="volume">74</biblScope>
			<biblScope unit="page" from="47" to="97" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Random graphs, models and generators of scaleless graphs</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Bernovskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Kuziuryn</surname></persName>
		</author>
		<ptr target="https://cyberleninka.ru/article/n/sluchaynye-grafy-modeli-i-generatory-bezmasshtabnyh-grafov" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Institute for System Programming</title>
				<meeting>the Institute for System Programming</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="page" from="419" to="432" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<title level="m" type="main">Algorithms and Dynamical Models for Communities and Reputation in Social Networks</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Traag</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-06391-1</idno>
		<ptr target="https://doi.org/10.1007/978-3-319-06391-1" />
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Springer International Publishing</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">The MovieLens Datasets: History and Context</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">M</forename><surname>Harper</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Konstan</surname></persName>
		</author>
		<idno type="DOI">10.1145/2827872</idno>
		<ptr target="https://doi.org/10.1145/2827872" />
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Interactive Intelligent Systems (TiiS)</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
