Adversarial Attack Algorithm for Introducing Degree Centrality Selection of Attack Nodes

被引:0
|
作者
Qian, Rong [1 ,2 ]
Xu, Xuefei [1 ]
Liu, Xiaoyu [3 ]
Zhang, Kejun [1 ,2 ]
Zeng, Junming [1 ]
Lyu, Zongfang [2 ]
Guo, Jinghui [1 ]
机构
[1] Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing,100070, China
[2] College of Computer Science and Technology, Xidian University, Xi’an,710071, China
[3] Department of Management, Beijing Electronic Science and Technology Institute, Beijing,100070, China
关键词
Convolutional neural networks - Graph algorithms - Graph neural networks - Network security;
D O I
10.3778/j.issn.1002-8331.2306-0265
中图分类号
学科分类号
摘要
Graph convolutional networks (GCN) are widely used in graph neural networks and play an important role in processing graph structured data. However, recent studies have shown that GCN is vulnerable to malicious attacks such as poisoning attacks. Of all the possible adversarial attacks against GCN, one particular approach is the TUA(target universal attack) against graph convolutional networks. In order to select attack nodes simply, the method adopts random selection strategy, which ignores the importance of neighbor to node, and has a negative impact on the success rate of attack. In response to this problem, adversarial attack algorithm based on degree centrality attack node selection strategy, adversarial attack algorithm based on degree centrality attack node selection strategy (DCANSS). Firstly, the method of selecting attack nodes is optimized, and the degree centrality is introduced to get the attack nodes. Secondly, the fake node is injected and connected to the attack node. Then, the auxiliary node is selected and the message passing mechanism of the graph convolutional network is applied to spread the node information, calculate the disturbance and assign the disturbance feature to the false node to complete the attack and achieve the misclassification goal. Experiments on three popular datasets show that when only three attack nodes and six fake nodes are used, the proposed attack has an average success rate of 90% against any victim node in the graph. By comparing DCANSS algorithm with TUA algorithm and other established baseline algorithms, the attack capability of DCANSS algorithm is further verified. © 2024 Journal of Computer Engineering and Applications Beijing Co., Ltd.; Science Press. All rights reserved.
引用
收藏
页码:285 / 293
相关论文
共 50 条
  • [1] Adversarial attack algorithm for traffic sign recognition
    Wang, Juan
    Shi, Lei
    Zhao, Yang
    Zhang, Haoxi
    Szczerbicki, Edward
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022,
  • [2] Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
    Levner, Eugene
    Tsadikovich, Dmitry
    ALGORITHMS, 2024, 17 (11)
  • [3] An Outlier Degree Shilling Attack Detection Algorithm Based on Dynamic Feature Selection
    Cao, Gaofeng
    Zhang, Huan
    Zheng, Jianbo
    Kuang, Li
    Duan, Yu
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2019, 29 (08) : 1159 - 1178
  • [4] Adversarial Attack against Modeling Attack on PUFs
    Wang, Sying-Jyan
    Chen, Yu-Shen
    Li, Katherine Shu-Min
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [5] Sparse and Imperceptible Adversarial Attack via a Homotopy Algorithm
    Zhu, Mingkang
    Chen, Tianlong
    Wang, Zhangyang
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139
  • [6] Optical Adversarial Attack
    Gnanasambandam, Abhiram
    Sherman, Alex M.
    Chan, Stanley H.
    2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW 2021), 2021, : 92 - 101
  • [7] Distributionally Adversarial Attack
    Zheng, Tianhang
    Chen, Changyou
    Ren, Kui
    THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, : 2253 - 2260
  • [8] Introducing the SlowDrop Attack
    Cambiaso, Enrico
    Chiola, Giovanni
    Aiello, Maurizio
    COMPUTER NETWORKS, 2019, 150 (234-249) : 234 - 249
  • [9] ADSAttack: An Adversarial Attack Algorithm via Searching Adversarial Distribution in Latent Space
    Wang, Haobo
    Zhu, Chenxi
    Cao, Yangjie
    Zhuang, Yan
    Li, Jie
    Chen, Xianfu
    ELECTRONICS, 2023, 12 (04)
  • [10] Detection by Attack: Detecting Adversarial Samples by Undercover Attack
    Zhou, Qifei
    Zhang, Rong
    Wu, Bo
    Li, Weiping
    Mo, Tong
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 146 - 164