Skip to main content

Research Repository

Advanced Search

Graph Injection Attack based on Node Similarity and Non-linear Feature Injection Strategy

Li, Qingru; Gao, Yanan; Wang, Fangwei; Wang, Changguang; Babaagba, Kehinde O.; Tan, Zhiyuan

Authors

Qingru Li

Yanan Gao

Fangwei Wang

Changguang Wang



Abstract

Graph Neural Networks (GNNs) exhibit promise in the domains of network analysis and recommendation systems. Notwithstanding , these networks are susceptible to node injection attacks. To mitigate this vulnerability, the academic community has put forth a plethora of defensive mechanisms. A significant number of these tactics aim to identify and remove injected nodes by comparing intrinsic node features and the similarity among neighboring nodes, thereby diminishing the impact of such nefarious injections. However, these defensive tactics are not impervious. To illuminate the potential vulnerabilities and quantitatively assess the ramifications of a successful breach, this research presents a Graph Injection Attack based on Node Similarity and a Non-linear Feature Injection Strategy (NSNFGIA), engineered to undermine node similarity-based detection mechanisms. Nodes within the original graph that share mutual neighbors with the injected nodes are selectively targeted, thereby augmenting the number of shared neighbors and enhancing node similarity. Injected features are meticulously initialized and optimized to intensify their impact on the model's output. Empirical results demonstrate that the proposed methodology surpasses traditional baseline attack strategies in effectiveness.

Citation

Li, Q., Gao, Y., Wang, F., Wang, C., Babaagba, K. O., & Tan, Z. (2024, October). Graph Injection Attack based on Node Similarity and Non-linear Feature Injection Strategy. Presented at 20th EAI International Conference on Security and Privacy in Communication Networks, Dubai, United Arab Emirates

Presentation Conference Type Conference Paper (published)
Conference Name 20th EAI International Conference on Security and Privacy in Communication Networks
Start Date Oct 28, 2024
End Date Oct 30, 2024
Acceptance Date Sep 2, 2024
Deposit Date Sep 2, 2024
Peer Reviewed Peer Reviewed
Keywords Node Injection Attack; Graph Neural Networks; Node Similarity; Non-linear Feature Injection
Public URL http://researchrepository.napier.ac.uk/Output/3796847
External URL https://securecomm.eai-conferences.org/2024/