Graph-based Anomaly Detection (GAD) is becoming prevalent due to the powerful representation abilities of graphs as well as recent advances in graph mining techniques. These GAD tools, however, expose a new attacking surface, ironically due to their unique advantage of being able to exploit the relations among data. That is, attackers now can manipulate those relations (i.e., the structure of the graph) to allow some target nodes to evade detection. In this paper, we exploit this vulnerability by designing a new type of targeted structural poisoning attacks to a representative regression-based GAD system termed OddBall. Specially, we formulate the attack against OddBall as a bi-level optimization problem, where the key technical challenge is to efficiently solve the problem in a discrete domain. We propose a novel attack method termed BinarizedAttack based on gradient descent. Comparing to prior arts, BinarizedAttack can better use the gradient information, making it particularly suitable for solving combinatorial optimization problems. Furthermore, we investigate the attack transferability of BinarizedAttack by employing it to attack other representation-learning-based GAD systems. Our comprehensive experiments demonstrate that BinarizedAttack is very effective in enabling target nodes to evade graph-based anomaly detection tools with limited attackers' budget, and in the black-box transfer attack setting, BinarizedAttack is also tested effective and in particular, can significantly change the node embeddings learned by the GAD systems. Our research thus opens the door to studying a new type of attack against security analytic tools that rely on graph data.
翻译:以图表为基础的异常探测(GAD)由于图表的强大代表能力以及图表采矿技术的最新进展而变得日益普遍。 然而,这些GAD工具暴露了一个新的攻击面,具有讽刺意味的是,这些工具暴露了一个新的攻击面,因为其独特的优势是能够利用数据之间的关系。这就是说,攻击者现在可以操纵这些关系(即图的结构),以便某些目标节点可以逃避探测。在本文中,我们利用这种脆弱性设计一种新型的定向结构性中毒攻击,将其设计成一种代议制的基于回归的开放GAD系统。我们特别将对Odbd Ball的攻击设计成双级的优化问题,其中的关键技术挑战是如何在一个离散域有效地解决问题。我们提出了一种新型攻击方法,即以梯度下降为基础的Atack。比亚塔克比较了一些梯度信息,使得它特别适合解决基于归轨的优化问题。此外,我们通过在基于黑度学习的GAADA系统上对基于其他数据最精确的系统进行攻击性转移,我们用这种系统对基于GADA系统进行快速的升级的系统进行全面实验,从而在基于对基于GAADA的系统进行精确的测试。