COREATTACK: Breaking Up the Core Structure of Graphs

11/30/2021
by   Bo Zhou, et al.
0

The concept of k-core in complex networks plays a key role in many applications, e.g., understanding the global structure, or identifying central/critical nodes, of a network. A malicious attacker with jamming ability can exploit the vulnerability of the k-core structure to attack the network and invalidate the network analysis methods, e.g., reducing the k-shell values of nodes can deceive graph algorithms, leading to the wrong decisions. In this paper, we investigate the robustness of the k-core structure under adversarial attacks by deleting edges, for the first time. Firstly, we give the general definition of targeted k-core attack, map it to the set cover problem which is NP-hard, and further introduce a series of evaluation metrics to measure the performance of attack methods. Then, we propose Q index theoretically as the probability that the terminal node of an edge does not belong to the innermost core, which is further used to guide the design of our heuristic attack methods, namely COREATTACK and GreedyCOREATTACK. The experiments on a variety of real-world networks demonstrate that our methods behave much better than a series of baselines, in terms of much smaller Edge Change Rate (ECR) and False Attack Rate (FAR), achieving state-of-the-art attack performance. More impressively, for certain real-world networks, only deleting one edge from the k-core may lead to the collapse of the innermost core, even if this core contains dozens of nodes. Such a phenomenon indicates that the k-core structure could be extremely vulnerable under adversarial attacks, and its robustness thus should be carefully addressed to ensure the security of many graph algorithms.

READ FULL TEXT

page 2

page 3

page 4

page 5

page 6

page 7

page 8

page 9

research
12/31/2022

Targeted k-node Collapse Problem: Towards Understanding the Robustness of Local k-core Structure

The concept of k-core, which indicates the largest induced subgraph wher...
research
09/14/2023

Influence Robustness of Nodes in Multiplex Networks against Attacks

Recent advances have focused mainly on the resilience of the monoplex ne...
research
06/21/2023

Quantifying Node-based Core Resilience

Core decomposition is an efficient building block for various graph anal...
research
03/28/2023

Robustness of Complex Networks Considering Load and Cascading Failure under Edge-removal Attack

In the understanding of important edges in complex networks, the edges w...
research
08/15/2023

Simple and Efficient Partial Graph Adversarial Attack: A New Perspective

As the study of graph neural networks becomes more intensive and compreh...
research
04/11/2023

Algorithms for Reconstructing DDoS Attack Graphs using Probabilistic Packet Marking

DoS and DDoS attacks are widely used and pose a constant threat. Here we...
research
02/12/2020

Graph Universal Adversarial Attacks: A Few Bad Actors Ruin Graph Learning Models

Deep neural networks, while generalize well, are known to be sensitive t...

Please sign up or login with your details

Forgot password? Click here to reset