Anti-attack detection method and system based on network node topological structure

A topology and attack detection technology, applied in character and pattern recognition, instrument, platform integrity maintenance, etc., can solve problems such as low practicability and poor universality, and achieve wide detection range, high detection accuracy, more realized effect

Active Publication Date: 2021-04-30
杭州江上印科技有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the current research, the existing detection methods are often a relatively complex detection algorithm, which is not v...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack detection method and system based on network node topological structure
  • Anti-attack detection method and system based on network node topological structure
  • Anti-attack detection method and system based on network node topological structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0062] refer to figure 1 , an adversarial attack detection method based on the topology of network nodes. The present invention takes the incremental attack method Nettack as an example, wherein the object to be attacked is the node classification task of the GCN model in the Cora citation network.

[0063] The present invention is divided into following several steps:

[0064] S1: Import network G=(V, E), where V represents the set of nodes in the network, and E represents the set of edges in the network. In this example we import a Cora citation network. There are 2708 nodes and 5429 links in the Cora network, each of which represents a paper, and if there is a citation relationship between two papers, it is considered that there is a link between them. We randomly select several nodes as the objects to be attacked....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-attack detection method based on a network node topological structure. The method comprises the following steps: S1, importing a network and selecting a node as an attack object; s2, calculating five network topology properties: clustering coefficient, betweenness centrality, approximate centrality, feature vector centrality and neighbor node average value; s4, constructing a feature vector space; s5, attacking the network by using an anti-attack method; s6, extracting five network topology properties from the attacked network and constructing a vector space; and S7, adopting a classifier model random forest in machine learning, and verifying the feature vectors extracted in the S4 and the S6 by adopting a reservation method to obtain classification precision. The invention further provides an anti-attack detection system based on the network node topological structure. According to the method, whether the nodes are attacked by a certain countermeasure attack method or not is detected through the topological properties of the multiple nodes in the network, the complexity of the detection algorithm is reduced, the method is universally suitable for various attack methods, and high detection precision is obtained.

Description

technical field [0001] The invention relates to a network node topology and a method and system for detecting an adversarial attack in the network, in particular to a method and system for detecting an adversarial attack based on a network node topology. Background technique [0002] In recent years, deep neural networks have achieved excellent results in many fields, such as image recognition, natural language processing, etc. Today, deep learning has been applied to many scenarios in our lives, some of which, such as autonomous driving, fraud detection, etc., require deep learning models to have high security and robustness. As a result, many researches on the vulnerability and vulnerability of deep neural networks have also become a hot spot. For example, for image recognition tasks, Goodfellow et al. proposed a gradient-based adversarial sample generation method to make deep neural networks misclassify. These attack methods for deep neural networks show that deep neural...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06K9/62
CPCG06F21/552G06F18/23G06F18/24323
Inventor 宣琦朱俊豪单雅璐
Owner 杭州江上印科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products