Scalable Attack on Graph Data by Important Nodes

被引:0
|
作者
Hu, Wenjiang [1 ]
Ma, Mingda [1 ]
Jiang, Yanan [1 ]
Xia, Hui [1 ]
机构
[1] Ocean Univ China, Fac Informat Sci & Engn, Qingdao 266100, Peoples R China
基金
中国国家自然科学基金;
关键词
Adversarial attack; Graph neural networks; Important node; Time efficiency; Network robustness;
D O I
10.1007/978-981-97-5501-1_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research shows that graph neural networks (GNNs) are easily disrupted due to the lack of robustness, a phenomenon that poses a serious security threat. Currently, most efforts to attack GNNs mainly use gradient information to guide the attacks and achieve superior performance. However, gradient-based attacks often lead to suboptimal results due to the discrete structure of graph data. The high complexity of time and space for large-scale graphs also take away the advantage of gradient attacks. In this work, we propose an attack method based on Important Nodes Controllable Labels (INCLA), which finds the set of important nodes for each class in the graph that have a great influence on the network during the graph convolution process and connects the target nodes to the important nodes to achieve the attack effect. In addition, since the gradient optimization attacks in graph neural networks are all salience attacks, which lead to their poor unnoticeability. We construct more unnoticeable adversarial examples based on the association between target nodes and important nodes, and use the Degree Assortativity Change (DAC) metric and Homophily Ratio Change (HRC) metric for verification. Extensive experimental results show that INCLA can significantly improve the time efficiency while maintaining the attack performance compared to the state-of-the-art adversarial attacks with the same attack budget.
引用
收藏
页码:176 / 188
页数:13
相关论文
共 50 条
  • [41] Scalable graph neural network-based framework for identifying critical nodes and links in complex networks
    Munikoti, Sai
    Das, Laya
    Natarajan, Balasubramaniam
    NEUROCOMPUTING, 2022, 468 : 211 - 221
  • [42] Scalable Analysis of Attack Scenarios
    Albanese, Massimiliano
    Jajodia, Sushi
    Pugliese, Andrea
    Subrahmanian, V. S.
    COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 416 - +
  • [43] On scalable attack detection in the network
    Kompella, Ramana Rao
    Singh, Sumeet
    Varghese, George
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (01) : 14 - 25
  • [44] Evaluating Criticality of Nodes in Consensus Network Under False Data Injection Attack
    Sawant, Vishal
    Wisniewski, Rafal
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 1435 - 1440
  • [45] A data mining approach to generating network attack graph for intrusion prediction
    Li, Zhi-tang
    Lei, Jie
    Wang, Li
    Li, Dong
    FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2007, : 307 - 311
  • [46] NETWORK ATTACK PATH PREDICTION BASED ON VULNERABILITY DATA AND KNOWLEDGE GRAPH
    Wang, Yifan
    Sun, Zhi
    Han, Ye
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2021, 17 (05): : 1717 - 1730
  • [47] Attack Graph Obfuscation
    Polad, Hadar
    Puzis, Rami
    Shapira, Bracha
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 269 - 287
  • [48] Scalable Graph Sampling on GPUs with Compressed Graph
    Yin, Hongbo
    Shao, Yingxia
    Miao, Xupeng
    Li, Yawen
    Cui, Bin
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 2383 - 2392
  • [49] Graph partitioning for scalable distributed graph computations
    Buluc, Aydin
    Madduri, Kamesh
    GRAPH PARTITIONING AND GRAPH CLUSTERING, 2013, 588 : 83 - +
  • [50] EGG-GAE: scalable graph neural networks for tabular data imputation
    Telyatnikov, Lev
    Scardapane, Simone
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 206, 2023, 206