BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection

被引:11
|
作者
Zhu, Yulin [1 ]
Lai, Yuni [1 ]
Zhao, Kaifa [1 ]
Luo, Xiapu [1 ]
Yuan, Mingquan [2 ]
Ren, Jian [3 ]
Zhou, Kai [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hksar, Peoples R China
[2] Sams Club Innovat Ctr, Dallas, TX USA
[3] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
基金
中国国家自然科学基金;
关键词
Graph-base anomaly detection; Graph learning and mining; Data poisoning attack; Adversarial machine learning; Discrete optimization; ALGORITHMS; REGRESSION;
D O I
10.1109/ICDE53745.2022.00006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graph-based Anomaly Detection (GAD) is becoming prevalent due to the powerful representation abilities of graphs as well as recent advances in graph mining techniques. These GAD tools, however, expose a new attacking surface, ironically due to their unique advantage of being able to exploit the relations among data. That is, attackers now can manipulate those relations (i.e., the structure of the graph) to allow some target nodes to evade detection. In this paper, we exploit this vulnerability by designing a new type of targeted structural poisoning attacks to a representative regression-based GAD system termed OddBall. Specifically, we formulate the attack against OddBall as a bi-level optimization problem, where the key technical challenge is to efficiently solve the problem in a discrete domain. We propose a novel attack method termed BinarizedAttack based on gradient descent. Comparing to prior arts, BinarizedAttack can better use the gradient information, making it particularly suitable for solving combinatorial optimization problems. Furthermore, we investigate the attack transferability of BinarizedAttack by employing it to attack other representation-learning-based GAD systems. Our comprehensive experiments demonstrate that BinarizedAttack is very effective in enabling target nodes to evade graph-based anomaly detection tools with limited attacker's budget, and in the black-box transfer attack setting, BinarizedAttack is also tested effective and in particular, can significantly change the node embeddings learned by the GAD systems. Our research thus opens the door to studying a new type of attack against security analytic tools that rely on graph data.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 50 条
  • [1] Poisoning Attacks to Graph-Based Recommender Systems
    Fang, Minghong
    Yang, Guolei
    Gong, Neil Zhenqiang
    Liu, Jia
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 381 - 392
  • [2] GraphAn: Graph-based Subsequence Anomaly Detection
    Boniol, Paul
    Palpanas, Themis
    Meftah, Mohammed
    Remy, Emmanuel
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 13 (12): : 2941 - 2944
  • [3] Anomaly Detection in Graph-Based Data Utilizing Graph Topology
    Ahmed, Ibrahim A.
    Moghaddass, Ramin
    2024 ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, RAMS, 2024,
  • [4] Anomaly Detection in Graph-Based Data Utilizing Graph Topology
    University of Miami, Department of Industrial & Systems Engineering, 1251 Memorial Drive, Coral Gables
    FL
    33146, United States
    Proc. Annu. Reliab. Maintainability Symp.,
  • [5] Dynamic Graph-Based Anomaly Detection in the Electrical Grid
    Li, Shimiao
    Pandey, Amritanshu
    Hooi, Bryan
    Faloutsos, Christos
    Pileggi, Larry
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2022, 37 (05) : 3408 - 3422
  • [6] A Graph-based Clustering Algorithm for Anomaly Intrusion Detection
    Zhou Mingqiang
    Huang Hui
    Wang Qian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1311 - 1314
  • [7] Evolving graph-based video crowd anomaly detection
    Yang, Meng
    Feng, Yanghe
    Rao, Aravinda S.
    Rajasegarar, Sutharshan
    Tian, Shucong
    Zhou, Zhengchun
    VISUAL COMPUTER, 2024, 40 (01): : 303 - 318
  • [8] GRAPH-BASED DETECTION OF SHILLING ATTACKS IN RECOMMENDER SYSTEMS
    Zhang, Zhuo
    Kulkarni, Sanjeev R.
    2013 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2013,
  • [9] Graph-based Anomaly Detection for Smart Cities: A Survey
    Sudrich, Simon
    Borges, Julio
    Beigl, Michael
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [10] Dynamic Graph-Based Anomaly Detection in the Electrical Grid
    Li, Shimiao
    Pandey, Amritanshu
    Hooi, Bryan
    Faloutsos, Christos
    Pileggi, Larry
    2023 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, PESGM, 2023,