Coupled-Space Attacks Against Random-Walk-Based Anomaly Detection

被引:0
|
作者
Lai, Yuni [1 ]
Waniek, Marcin [2 ]
Li, Liying [1 ]
Wu, Jingwen [1 ]
Zhu, Yulin [1 ]
Michalak, Tomasz P. [2 ]
Rahwan, Talal [3 ]
Zhou, Kai [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[2] Univ Warsaw, Inst Informat, PL-02093 Warsaw, Poland
[3] New York Univ Abu Dhabi, Dept Comp Sci, Abu Dhabi, U Arab Emirates
基金
欧洲研究理事会; 美国国家科学基金会;
关键词
Anomaly detection; Feature extraction; Optimization; Robustness; Security; Vectors; Pipelines; Graph-based anomaly detection; random walk; poisoning attack; adversarial attacks; security and privacy; GRAPH; DEFENSE;
D O I
10.1109/TIFS.2024.3468156
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Random Walks-based Anomaly Detection (RWAD) is commonly used to identify anomalous patterns in various applications. An intriguing characteristic of RWAD is that the input graph can either be pre-existing graphs or feature-derived graphs constructed from raw features. Consequently, there are two potential attack surfaces against RWAD: graph-space attacks and feature-space attacks. In this paper, we explore this vulnerability by designing practical coupled-space (interdependent feature-space and graph-space) attacks, investigating the interplay between graph-space and feature-space attacks. To this end, we conduct a thorough complexity analysis, proving that attacking RWAD is NP-hard. Then, we proceed to formulate the graph-space attack as a bi-level optimization problem and propose two strategies to solve it: alternative iteration (alterI-attack) or utilizing the closed-form solution of the random walk model (cf-attack). Finally, we utilize the results from the graph-space attacks as guidance to design more powerful feature-space attacks (i.e., graph-guided attacks). Comprehensive experiments demonstrate that our proposed attacks are effective in enabling the target nodes to evade the detection from RWAD with a limited attack budget. In addition, we conduct transfer attack experiments in a black-box setting, which show that our feature attack significantly decreases the anomaly scores of target nodes. Our study opens the door to studying the coupled-space attack against graph anomaly detection in which the graph space relies on the feature space.
引用
收藏
页码:9315 / 9329
页数:15
相关论文
共 50 条
  • [21] Towards Co-Evolution of Random-Walk-Based Embedding and Label Propagation for Node Classification
    Zhao, Ruixuan
    Liu, Shenghang
    Rao, Wei
    Xu, Hao
    Na, Chongning
    Li, Ruoyu
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 1513 - 1520
  • [22] Performance evaluation of a random-walk-based algorithm for embedding dynamically evolving trees in hypercubic networks
    Li, KQ
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (13): : 1327 - 1351
  • [23] Random walk with restart on hypergraphs: fast computation and an application to anomaly detection
    Jaewan Chun
    Geon Lee
    Kijung Shin
    Jinhong Jung
    Data Mining and Knowledge Discovery, 2024, 38 : 1222 - 1257
  • [24] Random walk with restart on hypergraphs: fast computation and an application to anomaly detection
    Chun, Jaewan
    Lee, Geon
    Shin, Kijung
    Jung, Jinhong
    DATA MINING AND KNOWLEDGE DISCOVERY, 2024, 38 (03) : 1222 - 1257
  • [25] A Random-Walk-Based Dynamic Tree Evolution Algorithm with Exponential Speed of Convergence to Optimality on Regular Networks
    Li, Keqin
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 80 - 85
  • [26] P2 random walk: self-supervised anomaly detection with pixel-point random walk
    Hua, Liujie
    Qi, Qianqian
    Long, Jun
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (02) : 2541 - 2555
  • [27] P2 random walk: self-supervised anomaly detection with pixel-point random walk
    Liujie Hua
    Qianqian Qi
    Jun Long
    Complex & Intelligent Systems, 2024, 10 : 2541 - 2555
  • [28] A Novel Anomaly Detection Approach for Mitigating Web-based Attacks against Clouds
    Zhang, Simin
    Li, Bo
    Li, Jianxin
    Zhang, Mingming
    Chen, Yang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 289 - 294
  • [29] A Theoretical Framework of Resilience: Biased Random Walk Routing Against Insider Attacks
    Erdene-Ochir, Ochirkhand
    Abdallah, Mohamed
    Qaraqe, Khaled
    Minier, Marine
    Valois, Fabrice
    2015 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2015, : 1602 - 1607
  • [30] RWNE: A Scalable Random-Walk-Based Network Embedding Framework with Personalized Higher-Order Proximity Preserved
    Li, Jianxin
    Ji, Cheng
    Peng, Hao
    He, Yu
    Song, Yangqiu
    Zhang, Xinmiao
    Peng, Fanzhang
    JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2021, 71 (71): : 237 - 263