A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
… how attack graphs and attack trees represent cyber-attacks in … to presenting cyber-attacks
as attack graphs or attack trees, … way cyber-attacks are represented in attack graphs and attack

Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system

X Zhou, W Liang, W Li, K Yan, S Shimizu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… In particular, we evaluate the loss based on xi when perturbing a node vi in the graph.
Thus, the loss change for a selected node xi can be defined and described as follows: …

Adversarial attack and defense on graph data: A survey

L Sun, Y Dou, C Yang, K Zhang, J Wang… - … on Knowledge and …, 2022 - ieeexplore.ieee.org
… different graph attacks and defenses along with their contributions and limitations, as well as
summarize the evaluation … Besides the applications mentioned above, attacking graphs in …

Tdgia: Effective injection attacks on graph neural networks

X Zou, Q Zheng, Y Dong, X Guan… - Proceedings of the 27th …, 2021 - dl.acm.org
… from the poison attack [17, 19], where the target model is retrained on the attacked graph. In
… is significantly larger than those commonly used in existing graph attack studies [19, 25, 26]. …

{ATLAS}: A sequence-based learning approach for attack investigation

A Alsaheel, Y Nan, S Ma, L Yu, G Walkup… - 30th USENIX security …, 2021 - usenix.org
… ATLAS recovers attack steps and construct attack stories with an average of 91.06% …
security investigators with a new means of identifying the attack events that make up the attack

BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors

W Wang, Y Shang, Y He, Y Li, J Liu - Information Sciences, 2020 - Elsevier
… flow-based features as well as 3 graph based features from network traffic to characterize
the behavior of botnets. We perform hybrid analysis of flow based and graph based features of …

Network attacks detection methods based on deep learning techniques: a survey

Y Wu, D Wei, J Feng - Security and Communication Networks, 2020 - Wiley Online Library
… , especially in cybersecurity. In this paper, we offer a review on attack detection methods
involving … Specifically, we firstly summarize fundamental problems of network security and attack

Direct acyclic graph-based ledger for Internet of Things: Performance and security analysis

Y Li, B Cao, M Peng, L Zhang, L Zhang… - … on Networking, 2020 - ieeexplore.ieee.org
… • We examine the attack strategy based on network load using a stochastic model, and
derive the expression of the probability to conduct a successful double-spending attack. The …

All you need is low (rank) defending against adversarial attacks on graphs

N Entezari, SA Al-Sayouri, A Darvishzadeh… - … web search and data …, 2020 - dl.acm.org
attacked graphs respectively. δA = A′ −A is the difference between the clean and attacked
graphs … added to the clean graph or removed from it as a result of the attack. We compute the …

Inference attacks against graph neural networks

Z Zhang, M Chen, M Backes, Y Shen… - 31st USENIX Security …, 2022 - usenix.org
… For instance, we achieve 0.98 attack AUC on the DD dataset. Third, … graph reconstruction
attack that can reconstruct a graph that has similar graph structural statistics to the target graph. …