attacks where a number of fake user profiles are inserted into the system to influence the
recommendations made to the users. In this paper, we have proposed three strategies of
detecting such attacks with the help of outlier analysis. In all these strategies, the attack-
profiles are considered as outliers in the user rating dataset. Firstly, we have used Partition
around Medoid (PAM) clustering algorithm in dete cting the attack-profiles. An incremental …