Coupled-Space Attacks Against Random-Walk-Based Anomaly Detection

被引:0
|
作者
Lai, Yuni [1 ]
Waniek, Marcin [2 ]
Li, Liying [1 ]
Wu, Jingwen [1 ]
Zhu, Yulin [1 ]
Michalak, Tomasz P. [2 ]
Rahwan, Talal [3 ]
Zhou, Kai [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[2] Univ Warsaw, Inst Informat, PL-02093 Warsaw, Poland
[3] New York Univ Abu Dhabi, Dept Comp Sci, Abu Dhabi, U Arab Emirates
基金
欧洲研究理事会; 美国国家科学基金会;
关键词
Anomaly detection; Feature extraction; Optimization; Robustness; Security; Vectors; Pipelines; Graph-based anomaly detection; random walk; poisoning attack; adversarial attacks; security and privacy; GRAPH; DEFENSE;
D O I
10.1109/TIFS.2024.3468156
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Random Walks-based Anomaly Detection (RWAD) is commonly used to identify anomalous patterns in various applications. An intriguing characteristic of RWAD is that the input graph can either be pre-existing graphs or feature-derived graphs constructed from raw features. Consequently, there are two potential attack surfaces against RWAD: graph-space attacks and feature-space attacks. In this paper, we explore this vulnerability by designing practical coupled-space (interdependent feature-space and graph-space) attacks, investigating the interplay between graph-space and feature-space attacks. To this end, we conduct a thorough complexity analysis, proving that attacking RWAD is NP-hard. Then, we proceed to formulate the graph-space attack as a bi-level optimization problem and propose two strategies to solve it: alternative iteration (alterI-attack) or utilizing the closed-form solution of the random walk model (cf-attack). Finally, we utilize the results from the graph-space attacks as guidance to design more powerful feature-space attacks (i.e., graph-guided attacks). Comprehensive experiments demonstrate that our proposed attacks are effective in enabling the target nodes to evade the detection from RWAD with a limited attack budget. In addition, we conduct transfer attack experiments in a black-box setting, which show that our feature attack significantly decreases the anomaly scores of target nodes. Our study opens the door to studying the coupled-space attack against graph anomaly detection in which the graph space relies on the feature space.
引用
收藏
页码:9315 / 9329
页数:15
相关论文
共 50 条
  • [41] A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs
    El Sayed, Mahmoud Said
    Le-Khac, Nhien-An
    Azer, Marianne A.
    Jurcut, Anca D.
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (04) : 1862 - 1880
  • [42] Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks
    Hairab, Belal Ibrahim
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    IEEE ACCESS, 2022, 10 : 98427 - 98440
  • [43] A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks
    Fang, Liming
    Li, Yang
    Liu, Zhe
    Yin, Changchun
    Li, Minghui
    Cao, Zehong Jimmy
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4260 - 4269
  • [44] An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks
    Kasim, Omer
    COMPUTER NETWORKS, 2020, 180
  • [45] Deep Learning based Efficient Anomaly Detection for Securing Process Control Systems against Injection Attacks
    Potluri, Sasanka
    Diedrich, Christian
    2019 IEEE 15TH INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2019, : 854 - 860
  • [46] Against fault attacks based on random infection mechanism
    Zhang, Jinbao
    Wu, Ning
    Zhang, Xiaoqiang
    Zhou, Fang
    IEICE ELECTRONICS EXPRESS, 2016, 13 (21):
  • [47] ADRIoT: An Edge-Assisted Anomaly Detection Framework Against IoT-Based Network Attacks
    Li, Ruoyu
    Li, Qing
    Zhou, Jianer
    Jiang, Yong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10576 - 10587
  • [48] VIDEO SALIENCY DETECTION BASED ON RANDOM WALK WITH RESTART
    Kim, Jun-Seong
    Kim, Hansang
    Sim, Jae-Young
    Kim, Chang-Su
    Lee, Sang-Uk
    2013 20TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2013), 2013, : 2465 - 2469
  • [49] Token loss detection for random walk based algorithm
    Bernard, Thibault
    Bui, Alain
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING, 2008, : 351 - +
  • [50] Target link protection against link-prediction-based attacks via artificial bee colony algorithm based on random walk
    Jiang, Zhongyuan
    Liu, Haibo
    Li, Jing
    Li, Xinghua
    Ma, Jianfeng
    Yu, Philip S.
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2024, 15 (11) : 4959 - 4971