Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks

Yulin Zhu, Tomasz Michalak, Xiapu Luo, Xiaoge Zhang, Kai Zhou

Research output: Journal article publicationJournal articleAcademic researchpeer-review

Abstract

Signed social networks are widely used to model the trust relationships among online users in security-sensitive systems such as cryptocurrency trading platforms, where trust prediction plays a critical role. In this paper, we investigate how attackers could mislead trust prediction by secretly manipulating signed networks. To this end, we first design effective poisoning attacks against representative trust prediction models. The attacks are formulated as hard bi-level optimization problems, for which we propose several efficient approximation solutions. However, the resulting <italic>basic attacks</italic> would severely change the structural semantics (in particular, both local and global balance properties) of a signed network, which makes the attacks prone to be detected by the powerful attack detectors we designed. Given this, we further refine the basic attacks by integrating some <italic>conflicting metrics</italic> as penalty terms into the objective function. The <italic>refined attacks</italic> become secrecy-aware, i.e., they can successfully evade attack detectors with high probability while sacrificing little attack performance. We conduct comprehensive experiments to demonstrate that the basic attacks can severely disrupt trust prediction but could be easily detected, and the refined attacks perform almost equally well while evading detection. Overall, our results significantly advance the knowledge in designing more practical attacks, reflecting more realistic threats to current trust prediction models. Moreover, the results also provide valuable insights and guidance for building up robust trust prediction systems.

Original languageEnglish
Pages (from-to)3567-3580
Number of pages14
JournalIEEE Transactions on Information Forensics and Security
Volume19
DOIs
Publication statusPublished - 13 Feb 2024

Keywords

  • Adversarial attack
  • Cryptocurrency
  • Detectors
  • Feature extraction
  • Measurement
  • Optimization
  • Predictive models
  • Secrecy-aware attack
  • Signed social networks
  • Task analysis
  • Trust prediction
  • trust prediction
  • adversarial attack
  • secrecy-aware attack

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks'. Together they form a unique fingerprint.

Cite this