论文标题

向签署的社交网络中的信任预测进行保密意识攻击

Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks

论文作者

Zhu, Yulin, Michalak, Tomasz, Luo, Xiapu, Zhang, Xiaoge, Zhou, Kai

论文摘要

签名的社交网络被广泛用于模拟对安全敏感系统(例如加密货币交易平台)中的在线用户之间的信任关系,在该系统中,信任预测起着至关重要的作用。在本文中,我们调查了攻击者如何通过秘密操纵签名网络来误导信任预测。为此,我们首先设计了针对代表性信任预测模型的有效中毒攻击。攻击被表达为硬双层优化问题,我们建议使用几种有效的近似解决方案。但是,由此产生的基本攻击将严重改变签名网络的结构语义(尤其是本地和全球平衡属性),这使我们设计的强大攻击探测器容易检测到攻击。鉴于此,我们通过将一些冲突的指标作为惩罚条款整合到目标函数中,进一步完善基本攻击。精致的攻击变成了保密的攻击,即,他们可以成功逃避攻击探测器,而牺牲了很少的攻击性能。我们进行了全面的实验,以证明基本攻击可以严重破坏信任的预测,但可以轻松检测到,而精致的攻击在逃避检测时的表现几乎同样出色。总体而言,我们的结果大大提高了设计更实际的攻击方面的知识,反映了对当前信任预测模型的更现实威胁。此外,结果还为建立强大的信任预测系统提供了宝贵的见解和指导。

Signed social networks are widely used to model the trust relationships among online users in security-sensitive systems such as cryptocurrency trading platforms, where trust prediction plays a critical role. In this paper, we investigate how attackers could mislead trust prediction by secretly manipulating signed networks. To this end, we first design effective poisoning attacks against representative trust prediction models. The attacks are formulated as hard bi-level optimization problems, for which we propose several efficient approximation solutions. However, the resulting basic attacks would severely change the structural semantics (in particular, both local and global balance properties) of a signed network, which makes the attacks prone to be detected by the powerful attack detectors we designed. Given this, we further refine the basic attacks by integrating some conflicting metrics as penalty terms into the objective function. The refined attacks become secrecy-aware, i.e., they can successfully evade attack detectors with high probability while sacrificing little attack performance. We conduct comprehensive experiments to demonstrate that the basic attacks can severely disrupt trust prediction but could be easily detected, and the refined attacks perform almost equally well while evading detection. Overall, our results significantly advance the knowledge in designing more practical attacks, reflecting more realistic threats to current trust prediction models. Moreover, the results also provide valuable insights and guidance for building up robust trust prediction systems.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源