基于子图同构的社交网络攻击

Mengjiao Guo, Chi-Hung Chi, Hui Zheng, Jing He, Xiaoting Zhang
{"title":"基于子图同构的社交网络攻击","authors":"Mengjiao Guo, Chi-Hung Chi, Hui Zheng, Jing He, Xiaoting Zhang","doi":"10.1145/3498851.3499024","DOIUrl":null,"url":null,"abstract":"It has been widely recognized that social network analysis of group relationships and behaviors come to thrive, so publicity social networks have gained growing attention from third-party individuals for academic researchers and advertisers. Anonymous versions are generally obtained from the naive anonymization mechanism through identity transformation to fend off attacks on socially sensitive information. The adversaries intend to implement person re-identification in anonymous data, and they generally possess a subset of social interaction information of the target user. In this way, a privacy breach could be achieved by exploiting the neighbourhood of the object's known structural information. Say, if one node's information is breached, other nodes’ private information will be compromised according to the detected structural information. Therefore, all the mentioned above are equivalent to the subgraph isomorphism problem to identify who is who in the social networks. Existing enumeration and indexing-related subgraph isomorphism methods cannot process matching problems with both large target and query graphs. Therefore, subgraph querying is a knotty problem pressing for a solution. In this work, we elaborate on the subgraph of structural attack. Our subgraph isomorphism-based method adopts a 3-stage framework for learning and refining structural correspondences over a large graph. First, we generate a set of candidate matches and compare the query graph with these candidate graphs over the corresponding number of vertex and edge, which can noticeably reduce the number of candidate graphs. Secondly, we employ the permutation theorem to evaluate the row sum of vertex and edge adjacency matrix of query graph and candidate graph. Lastly, our proposed scheme deploys the well-found equinumerosity theorem to verify if the query graph and candidate graph satisfy the isomorphic relationship. Solid evaluation criteria on time complexity verify the proposed attack strategy.","PeriodicalId":89230,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","volume":"19 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Subgraph Isomorphism-based Attack Towards Social Networks\",\"authors\":\"Mengjiao Guo, Chi-Hung Chi, Hui Zheng, Jing He, Xiaoting Zhang\",\"doi\":\"10.1145/3498851.3499024\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It has been widely recognized that social network analysis of group relationships and behaviors come to thrive, so publicity social networks have gained growing attention from third-party individuals for academic researchers and advertisers. Anonymous versions are generally obtained from the naive anonymization mechanism through identity transformation to fend off attacks on socially sensitive information. The adversaries intend to implement person re-identification in anonymous data, and they generally possess a subset of social interaction information of the target user. In this way, a privacy breach could be achieved by exploiting the neighbourhood of the object's known structural information. Say, if one node's information is breached, other nodes’ private information will be compromised according to the detected structural information. Therefore, all the mentioned above are equivalent to the subgraph isomorphism problem to identify who is who in the social networks. Existing enumeration and indexing-related subgraph isomorphism methods cannot process matching problems with both large target and query graphs. Therefore, subgraph querying is a knotty problem pressing for a solution. In this work, we elaborate on the subgraph of structural attack. Our subgraph isomorphism-based method adopts a 3-stage framework for learning and refining structural correspondences over a large graph. First, we generate a set of candidate matches and compare the query graph with these candidate graphs over the corresponding number of vertex and edge, which can noticeably reduce the number of candidate graphs. Secondly, we employ the permutation theorem to evaluate the row sum of vertex and edge adjacency matrix of query graph and candidate graph. Lastly, our proposed scheme deploys the well-found equinumerosity theorem to verify if the query graph and candidate graph satisfy the isomorphic relationship. Solid evaluation criteria on time complexity verify the proposed attack strategy.\",\"PeriodicalId\":89230,\"journal\":{\"name\":\"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology\",\"volume\":\"19 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3498851.3499024\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3498851.3499024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

人们普遍认为,社会网络对群体关系和行为的分析正在蓬勃发展,因此,为学术研究人员和广告商提供宣传的社会网络越来越受到第三方个人的关注。匿名版本一般采用朴素匿名化机制,通过身份转换获得,以抵御对社会敏感信息的攻击。攻击者意图在匿名数据中实现人员再识别,他们通常拥有目标用户的社会交互信息子集。通过这种方式,可以通过利用对象的已知结构信息的邻域来实现隐私泄露。例如,如果一个节点的信息被泄露,那么根据检测到的结构信息,其他节点的私有信息也会被泄露。因此,上述所有问题都等价于识别社交网络中谁是谁的子图同构问题。现有的枚举和索引相关子图同构方法不能同时处理大型目标图和查询图的匹配问题。因此,子图查询是一个亟待解决的棘手问题。在这项工作中,我们详细阐述了结构攻击的子图。我们的基于子图同构的方法采用了一个三阶段的框架来学习和提炼大图上的结构对应。首先,我们生成一组候选匹配,并将查询图与这些候选图在相应数量的顶点和边上进行比较,这可以显着减少候选图的数量。其次,利用置换定理对查询图和候选图的顶点和边邻接矩阵行和求值;最后,利用已发现的等数定理验证查询图和候选图是否满足同构关系。可靠的时间复杂度评价标准验证了所提出的攻击策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Subgraph Isomorphism-based Attack Towards Social Networks
It has been widely recognized that social network analysis of group relationships and behaviors come to thrive, so publicity social networks have gained growing attention from third-party individuals for academic researchers and advertisers. Anonymous versions are generally obtained from the naive anonymization mechanism through identity transformation to fend off attacks on socially sensitive information. The adversaries intend to implement person re-identification in anonymous data, and they generally possess a subset of social interaction information of the target user. In this way, a privacy breach could be achieved by exploiting the neighbourhood of the object's known structural information. Say, if one node's information is breached, other nodes’ private information will be compromised according to the detected structural information. Therefore, all the mentioned above are equivalent to the subgraph isomorphism problem to identify who is who in the social networks. Existing enumeration and indexing-related subgraph isomorphism methods cannot process matching problems with both large target and query graphs. Therefore, subgraph querying is a knotty problem pressing for a solution. In this work, we elaborate on the subgraph of structural attack. Our subgraph isomorphism-based method adopts a 3-stage framework for learning and refining structural correspondences over a large graph. First, we generate a set of candidate matches and compare the query graph with these candidate graphs over the corresponding number of vertex and edge, which can noticeably reduce the number of candidate graphs. Secondly, we employ the permutation theorem to evaluate the row sum of vertex and edge adjacency matrix of query graph and candidate graph. Lastly, our proposed scheme deploys the well-found equinumerosity theorem to verify if the query graph and candidate graph satisfy the isomorphic relationship. Solid evaluation criteria on time complexity verify the proposed attack strategy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信