An Effective Node Injection Approach for Attacking Social Network Alignment

The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2025, Vol.20, p.589-604
Hauptverfasser: Jiang, Shuyu, Qiu, Yunxiang, Mo, Xian, Tang, Rui, Wang, Wei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 604
container_issue
container_start_page 589
container_title IEEE transactions on information forensics and security
container_volume 20
creator Jiang, Shuyu
Qiu, Yunxiang
Mo, Xian
Tang, Rui
Wang, Wei
description The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive user information, thereby posing cybersecurity risks. Although many researchers have explored attacking SNA (ASNA) through network modification attacks to protect users, practical feasibility remains challenging. In this study, we propose an effective node injection attack via a dynamic programming framework (DPNIA) to address the problem of modeling and solving ASNA within a limited time and balancing the costs and benefits. DPNIA models ASNA as a problem of maximizing the number of confirmed incorrect correspondent node pairs with greater similarity scores than the pairs between existing nodes, thereby making ASNA solvable. A cross-network evaluation method is employed directly to identify node vulnerabilities, facilitating progressive attacking from easy to difficult. In addition, an optimal injection strategy searching method based on dynamic programming is used to determine which links should be added between the injected and existing nodes, thereby enhancing the effectiveness of the attack at a low cost. Experiments on four real-world datasets demonstrated that DPNIA consistently and significantly surpasses various baselines when attacking both multiple networks simultaneously and a single network.
doi_str_mv 10.1109/TIFS.2024.3515842
format Article
fullrecord <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10793446</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10793446</ieee_id><sourcerecordid>10_1109_TIFS_2024_3515842</sourcerecordid><originalsourceid>FETCH-LOGICAL-c999-6da3155bb00ce1893c7dfe1ee612abca51bf939127286c5eb2e673c3058a42a00</originalsourceid><addsrcrecordid>eNpNkN1Kw0AQRhdRsFYfQPBiXyB1Z_-SvQyltcVSL9r7sNnM1rRptmyC4tvb0CJeffPBnGE4hDwDmwAw87pdzjcTzricCAUqk_yGjEApnWjG4fZvBnFPHrpuz5iUoLMRec9bOvMeXV9_IV2HCumy3Q81tDQ_nWKw7pP6EGne99Yd6nZHN8HVtqFr7L9DPNC8qXftEdv-kdx523T4dM0x2c5n2-kiWX28Laf5KnHGmERXVpy_KUvGHEJmhEsrj4CogdvSWQWlN8IAT3mmncKSo06FE0xlVnLL2JjA5ayLoesi-uIU66ONPwWwYpBRDDKKQUZxlXFmXi5MjYj_9lMjpNTsF2tpWys</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An Effective Node Injection Approach for Attacking Social Network Alignment</title><source>IEEE Electronic Library (IEL)</source><creator>Jiang, Shuyu ; Qiu, Yunxiang ; Mo, Xian ; Tang, Rui ; Wang, Wei</creator><creatorcontrib>Jiang, Shuyu ; Qiu, Yunxiang ; Mo, Xian ; Tang, Rui ; Wang, Wei</creatorcontrib><description>The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive user information, thereby posing cybersecurity risks. Although many researchers have explored attacking SNA (ASNA) through network modification attacks to protect users, practical feasibility remains challenging. In this study, we propose an effective node injection attack via a dynamic programming framework (DPNIA) to address the problem of modeling and solving ASNA within a limited time and balancing the costs and benefits. DPNIA models ASNA as a problem of maximizing the number of confirmed incorrect correspondent node pairs with greater similarity scores than the pairs between existing nodes, thereby making ASNA solvable. A cross-network evaluation method is employed directly to identify node vulnerabilities, facilitating progressive attacking from easy to difficult. In addition, an optimal injection strategy searching method based on dynamic programming is used to determine which links should be added between the injected and existing nodes, thereby enhancing the effectiveness of the attack at a low cost. Experiments on four real-world datasets demonstrated that DPNIA consistently and significantly surpasses various baselines when attacking both multiple networks simultaneously and a single network.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2024.3515842</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Computer security ; Costs ; Data models ; Dynamic programming ; Electronic commerce ; Faces ; Graph neural networks ; node injection attack ; Social network alignment ; Social networking (online) ; Time complexity ; user privacy</subject><ispartof>IEEE transactions on information forensics and security, 2025, Vol.20, p.589-604</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c999-6da3155bb00ce1893c7dfe1ee612abca51bf939127286c5eb2e673c3058a42a00</cites><orcidid>0000-0003-4088-5395 ; 0000-0002-3112-4861 ; 0000-0002-1249-9190</orcidid></display><links><openurl>$$Topenurl_article</openurl><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776</link.rule.ids></links><search><creatorcontrib>Jiang, Shuyu</creatorcontrib><creatorcontrib>Qiu, Yunxiang</creatorcontrib><creatorcontrib>Mo, Xian</creatorcontrib><creatorcontrib>Tang, Rui</creatorcontrib><creatorcontrib>Wang, Wei</creatorcontrib><title>An Effective Node Injection Approach for Attacking Social Network Alignment</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive user information, thereby posing cybersecurity risks. Although many researchers have explored attacking SNA (ASNA) through network modification attacks to protect users, practical feasibility remains challenging. In this study, we propose an effective node injection attack via a dynamic programming framework (DPNIA) to address the problem of modeling and solving ASNA within a limited time and balancing the costs and benefits. DPNIA models ASNA as a problem of maximizing the number of confirmed incorrect correspondent node pairs with greater similarity scores than the pairs between existing nodes, thereby making ASNA solvable. A cross-network evaluation method is employed directly to identify node vulnerabilities, facilitating progressive attacking from easy to difficult. In addition, an optimal injection strategy searching method based on dynamic programming is used to determine which links should be added between the injected and existing nodes, thereby enhancing the effectiveness of the attack at a low cost. Experiments on four real-world datasets demonstrated that DPNIA consistently and significantly surpasses various baselines when attacking both multiple networks simultaneously and a single network.</description><subject>Analytical models</subject><subject>Computer security</subject><subject>Costs</subject><subject>Data models</subject><subject>Dynamic programming</subject><subject>Electronic commerce</subject><subject>Faces</subject><subject>Graph neural networks</subject><subject>node injection attack</subject><subject>Social network alignment</subject><subject>Social networking (online)</subject><subject>Time complexity</subject><subject>user privacy</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>false</fulltext><rsrctype>article</rsrctype><creationdate>2025</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkN1Kw0AQRhdRsFYfQPBiXyB1Z_-SvQyltcVSL9r7sNnM1rRptmyC4tvb0CJeffPBnGE4hDwDmwAw87pdzjcTzricCAUqk_yGjEApnWjG4fZvBnFPHrpuz5iUoLMRec9bOvMeXV9_IV2HCumy3Q81tDQ_nWKw7pP6EGne99Yd6nZHN8HVtqFr7L9DPNC8qXftEdv-kdx523T4dM0x2c5n2-kiWX28Laf5KnHGmERXVpy_KUvGHEJmhEsrj4CogdvSWQWlN8IAT3mmncKSo06FE0xlVnLL2JjA5ayLoesi-uIU66ONPwWwYpBRDDKKQUZxlXFmXi5MjYj_9lMjpNTsF2tpWys</recordid><startdate>2025</startdate><enddate>2025</enddate><creator>Jiang, Shuyu</creator><creator>Qiu, Yunxiang</creator><creator>Mo, Xian</creator><creator>Tang, Rui</creator><creator>Wang, Wei</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-4088-5395</orcidid><orcidid>https://orcid.org/0000-0002-3112-4861</orcidid><orcidid>https://orcid.org/0000-0002-1249-9190</orcidid></search><sort><creationdate>2025</creationdate><title>An Effective Node Injection Approach for Attacking Social Network Alignment</title><author>Jiang, Shuyu ; Qiu, Yunxiang ; Mo, Xian ; Tang, Rui ; Wang, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c999-6da3155bb00ce1893c7dfe1ee612abca51bf939127286c5eb2e673c3058a42a00</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2025</creationdate><topic>Analytical models</topic><topic>Computer security</topic><topic>Costs</topic><topic>Data models</topic><topic>Dynamic programming</topic><topic>Electronic commerce</topic><topic>Faces</topic><topic>Graph neural networks</topic><topic>node injection attack</topic><topic>Social network alignment</topic><topic>Social networking (online)</topic><topic>Time complexity</topic><topic>user privacy</topic><toplevel>peer_reviewed</toplevel><creatorcontrib>Jiang, Shuyu</creatorcontrib><creatorcontrib>Qiu, Yunxiang</creatorcontrib><creatorcontrib>Mo, Xian</creatorcontrib><creatorcontrib>Tang, Rui</creatorcontrib><creatorcontrib>Wang, Wei</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>no_fulltext</fulltext></delivery><addata><au>Jiang, Shuyu</au><au>Qiu, Yunxiang</au><au>Mo, Xian</au><au>Tang, Rui</au><au>Wang, Wei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An Effective Node Injection Approach for Attacking Social Network Alignment</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2025</date><risdate>2025</risdate><volume>20</volume><spage>589</spage><epage>604</epage><pages>589-604</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The importance of social network alignment (SNA) for various downstream applications, such as social network information fusion and e-commerce recommendation, has prompted numerous professionals to develop and share SNA tools. However, malicious actors can exploit these tools to integrate sensitive user information, thereby posing cybersecurity risks. Although many researchers have explored attacking SNA (ASNA) through network modification attacks to protect users, practical feasibility remains challenging. In this study, we propose an effective node injection attack via a dynamic programming framework (DPNIA) to address the problem of modeling and solving ASNA within a limited time and balancing the costs and benefits. DPNIA models ASNA as a problem of maximizing the number of confirmed incorrect correspondent node pairs with greater similarity scores than the pairs between existing nodes, thereby making ASNA solvable. A cross-network evaluation method is employed directly to identify node vulnerabilities, facilitating progressive attacking from easy to difficult. In addition, an optimal injection strategy searching method based on dynamic programming is used to determine which links should be added between the injected and existing nodes, thereby enhancing the effectiveness of the attack at a low cost. Experiments on four real-world datasets demonstrated that DPNIA consistently and significantly surpasses various baselines when attacking both multiple networks simultaneously and a single network.</abstract><pub>IEEE</pub><doi>10.1109/TIFS.2024.3515842</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-4088-5395</orcidid><orcidid>https://orcid.org/0000-0002-3112-4861</orcidid><orcidid>https://orcid.org/0000-0002-1249-9190</orcidid></addata></record>
fulltext no_fulltext
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2025, Vol.20, p.589-604
issn 1556-6013
1556-6021
language eng
recordid cdi_ieee_primary_10793446
source IEEE Electronic Library (IEL)
subjects Analytical models
Computer security
Costs
Data models
Dynamic programming
Electronic commerce
Faces
Graph neural networks
node injection attack
Social network alignment
Social networking (online)
Time complexity
user privacy
title An Effective Node Injection Approach for Attacking Social Network Alignment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T15%3A28%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20Effective%20Node%20Injection%20Approach%20for%20Attacking%20Social%20Network%20Alignment&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Jiang,%20Shuyu&rft.date=2025&rft.volume=20&rft.spage=589&rft.epage=604&rft.pages=589-604&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2024.3515842&rft_dat=%3Ccrossref_ieee_%3E10_1109_TIFS_2024_3515842%3C/crossref_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10793446&rfr_iscdi=true