Abstract
Signed social networks are widely used to model the trust relationships among online users in security-sensitive systems such as cryptocurrency trading platforms, where trust prediction plays a critical role. In this paper, we investigate how attackers could mislead trust prediction by secretly manipulating signed networks. To this end, we first design effective poisoning attacks against representative trust prediction models. The attacks are formulated as hard bi-level optimization problems, for which we propose several efficient approximation solutions. However, the resulting <italic>basic attacks</italic> would severely change the structural semantics (in particular, both local and global balance properties) of a signed network, which makes the attacks prone to be detected by the powerful attack detectors we designed. Given this, we further refine the basic attacks by integrating some <italic>conflicting metrics</italic> as penalty terms into the objective function. The <italic>refined attacks</italic> become secrecy-aware, i.e., they can successfully evade attack detectors with high probability while sacrificing little attack performance. We conduct comprehensive experiments to demonstrate that the basic attacks can severely disrupt trust prediction but could be easily detected, and the refined attacks perform almost equally well while evading detection. Overall, our results significantly advance the knowledge in designing more practical attacks, reflecting more realistic threats to current trust prediction models. Moreover, the results also provide valuable insights and guidance for building up robust trust prediction systems.
Original language | English |
---|---|
Pages (from-to) | 3567-3580 |
Number of pages | 14 |
Journal | IEEE Transactions on Information Forensics and Security |
Volume | 19 |
DOIs | |
Publication status | Published - 13 Feb 2024 |
Keywords
- Adversarial attack
- Cryptocurrency
- Detectors
- Feature extraction
- Measurement
- Optimization
- Predictive models
- Secrecy-aware attack
- Signed social networks
- Task analysis
- Trust prediction
- trust prediction
- adversarial attack
- secrecy-aware attack
ASJC Scopus subject areas
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications