TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support (2306.13339v4)
Abstract: Trust evaluation assesses trust relationships between entities and facilitates decision-making. Machine Learning (ML) shows great potential for trust evaluation owing to its learning capabilities. In recent years, Graph Neural Networks (GNNs), as a new ML paradigm, have demonstrated superiority in dealing with graph data. This has motivated researchers to explore their use in trust evaluation, as trust relationships among entities can be modeled as a graph. However, current trust evaluation methods that employ GNNs fail to fully satisfy the dynamic nature of trust, overlook the adverse effects of trust-related attacks, and cannot provide convincing explanations on evaluation results. To address these problems, we propose TrustGuard, a GNN-based accurate trust evaluation model that supports trust dynamicity, is robust against typical attacks, and provides explanations through visualization. Specifically, TrustGuard is designed with a layered architecture that contains a snapshot input layer, a spatial aggregation layer, a temporal aggregation layer, and a prediction layer. Among them, the spatial aggregation layer adopts a defense mechanism to robustly aggregate local trust, and the temporal aggregation layer applies an attention mechanism for effective learning of temporal patterns. Extensive experiments on two real-world datasets show that TrustGuard outperforms state-of-the-art GNN-based trust evaluation models with respect to trust prediction across single-timeslot and multi-timeslot, even in the presence of attacks. In addition, TrustGuard can explain its evaluation results by visualizing both spatial and temporal views.
- Z. Yan and S. Holtmanns, “Trust modeling and management: from social trust to digital trust,” in Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions. IGI Global, 2008, pp. 290–323.
- Z. Yan and C. Prehofer, “Autonomic trust management for a component-based software system,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 6, pp. 810–823, 2010.
- J. Wang, X. Jing, Z. Yan, Y. Fu, W. Pedrycz, and L. T. Yang, “A survey on trust evaluation based on machine learning,” ACM Computing Surveys (CSUR), vol. 53, no. 5, pp. 1–36, 2020.
- F. Bao, R. Chen, M. Chang, and J.-H. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Transactions on Network and Service Management, vol. 9, no. 2, pp. 169–183, 2012.
- Z. Yan, X. Li, M. Wang, and A. V. Vasilakos, “Flexible data access control based on trust and reputation in cloud computing,” IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 485–498, 2015.
- I.-R. Chen, F. Bao, and J. Guo, “Trust-based service management for social internet of things systems,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 6, pp. 684–696, 2016.
- I.-R. Chen, J. Guo, and F. Bao, “Trust management for soa-based iot and its application to service composition,” IEEE Transactions on Services Computing, vol. 9, no. 3, pp. 482–495, 2016.
- M. Ylianttila, R. Kantola, A. Gurtov, L. Mucchi, I. Oppermann, Z. Yan, T. H. Nguyen, F. Liu, T. Hewa, M. Liyanage et al., “6g white paper: Research challenges for trust, security and privacy,” arXiv preprint arXiv:2004.11665, 2020.
- J. Leskovec and A. Krevl, “SNAP Datasets: Stanford large network dataset collection,” http://snap.stanford.edu/data, Jun. 2014.
- J. Wang, Z. Yan, H. Wang, T. Li, and W. Pedrycz, “A survey on trust models in heterogeneous networks,” IEEE Communications Surveys & Tutorials, vol. 24, no. 4, pp. 2127–2162, 2022.
- A. Josang and R. Ismail, “The beta reputation system,” in Proceedings of the 15th Bled Electronic Commerce Conference, 2002, pp. 2502–2511.
- G. Liu, C. Li, and Q. Yang, “Neuralwalk: Trust assessment in online social networks with neural networks,” in IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2019, pp. 1999–2007.
- Z. Yang, W. Pei, M. Chen, and C. Yue, “Wtagraph: Web tracking and advertising detection using graph neural networks,” in IEEE Symposium on Security and Privacy (SP), 2022, pp. 1540–1557.
- Y. Cao, H. Jiang, Y. Deng, J. Wu, P. Zhou, and W. Luo, “Detecting and mitigating ddos attacks in sdn using spatial-temporal graph convolutional network,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 6, pp. 3855–3872, 2022.
- C. Huo, D. He, C. Liang, D. Jin, T. Qiu, and L. Wu, “Trustgnn: Graph neural network-based trust evaluation via learnable propagative and composable nature,” IEEE Transactions on Neural Networks and Learning Systems, 2023.
- Z. Yu, D. Jin, C. Huo, Z. Wang, X. Liu, H. Qi, J. Wu, and L. Wu, “Kgtrust: Evaluating trustworthiness of siot via knowledge enhanced graph neural networks,” in Proceedings of the ACM Web Conference, 2023, pp. 727–736.
- W. Lin, Z. Gao, and B. Li, “Guardian: Evaluating trust in online social networks with graph convolutional networks,” in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 2020, pp. 914–923.
- N. Jiang, W. Jie, J. Li, X. Liu, and D. Jin, “Gatrust: a multi-aspect graph attention network model for trust assessment in osns,” IEEE Transactions on Knowledge and Data Engineering, 2022.
- W. Lin and B. Li, “Medley: Predicting social trust in time-varying online social networks,” in IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 2021, pp. 1–10.
- D. Xu, C. Ruan, E. Korpeoglu, S. Kumar, and K. Achan, “Inductive representation learning on temporal graphs,” in International Conference on Learning Representations, 2020.
- B. Wang, J. Jia, and N. Z. Gong, “Graph-based security and privacy analytics via collective classification with joint weight learning and propagation,” in 26th Annual Network and Distributed System Security Symposium (NDSS), 2019.
- Y. Liu, W. Zhou, and H. Chen, “Efficiently promoting product online outcome: An iterative rating attack utilizing product and market property,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 6, pp. 1444–1457, 2017.
- M. Luca and G. Zervas, “Fake it till you make it: Reputation, competition, and yelp review fraud,” Management Science, vol. 62, no. 12, pp. 3412–3427, 2016.
- D. Han, Z. Wang, W. Chen, K. Wang, R. Yu, S. Wang, H. Zhang, Z. Wang, M. Jin, J. Yang, X. Shi, and X. Yin, “Anomaly detection in the open world: Normality shift detection, explanation, and adaptation,” in 30th Annual Network and Distributed System Security Symposium (NDSS), 2023.
- A. Pareja, G. Domeniconi, J. Chen, T. Ma, T. Suzumura, H. Kanezashi, T. Kaler, T. Schardl, and C. Leiserson, “Evolvegcn: Evolving graph convolutional networks for dynamic graphs,” in Proceedings of the AAAI Conference on Artificial Intelligence, 2020, pp. 5363–5370.
- I. J. King and H. H. Huang, “Euler: Detecting network lateral movement via scalable temporal graph link prediction,” in 29th Annual Network and Distributed System Security Symposium (NDSS), 2022.
- Y. Seo, M. Defferrard, P. Vandergheynst, and X. Bresson, “Structured sequence modeling with graph convolutional recurrent networks,” in International Conference on Neural Information Processing, 2018, pp. 362–373.
- A. Sankar, Y. Wu, L. Gou, W. Zhang, and H. Yang, “Dysat: Deep neural representation learning on dynamic graphs via self-attention networks,” in Proceedings of the 13th International Conference on Web Search and Data Mining, 2020, pp. 519–527.
- T. N. Kipf and M. Welling, “Semi-supervised classification with graph convolutional networks,” in International Conference on Learning Representations, 2017.
- P. Veličković, G. Cucurull, A. Casanova, A. Romero, P. Liò, and Y. Bengio, “Graph attention networks,” in International Conference on Learning Representations, 2018.
- Z. Sun, Z.-H. Deng, J.-Y. Nie, and J. Tang, “Rotate: Knowledge graph embedding by relational rotation in complex space,” in International Conference on Learning Representations, 2019.
- Y. Zhu, F. Lyu, C. Hu, X. Chen, and X. Liu, “Learnable encoder-decoder architecture for dynamic graph: A survey,” arXiv preprint arXiv:2203.10480, 2022.
- P. Massa, M. Salvetti, and D. Tomasoni, “Bowling alone and trust decline in social network sites,” in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009, pp. 658–663.
- M. Jagielski, G. Severi, N. Pousette Harger, and A. Oprea, “Subpopulation data poisoning attacks,” in Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021, pp. 3104–3122.
- Z. Ying, D. Bourgeois, J. You, M. Zitnik, and J. Leskovec, “Gnnexplainer: Generating explanations for graph neural networks,” in Advances in Neural Information Processing Systems, 2019.
- A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, Ł. Kaiser, and I. Polosukhin, “Attention is all you need,” in Advances in Neural Information Processing Systems, vol. 30, 2017.
- H. Wu, C. Wang, Y. Tyshetskiy, A. Docherty, K. Lu, and L. Zhu, “Adversarial examples for graph data: deep insights into attack and defense,” in Proceedings of the 28th International Joint Conference on Artificial Intelligence, 2019, pp. 4816–4823.
- W. Jin, Y. Ma, X. Liu, X. Tang, S. Wang, and J. Tang, “Graph structure learning for robust graph neural networks,” in Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2020, pp. 66–74.
- X. Zhang and M. Zitnik, “Gnnguard: Defending graph neural networks against adversarial attacks,” in Advances in Neural Information Processing Systems, vol. 33, 2020, pp. 9263–9275.
- K. Eckle and J. Schmidt-Hieber, “A comparison of deep networks with relu activation function and linear spline-type methods,” Neural Networks, vol. 110, pp. 232–242, 2019.
- A. Grover and J. Leskovec, “node2vec: Scalable feature learning for networks,” in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016, pp. 855–864.
- W. Hamilton, Z. Ying, and J. Leskovec, “Inductive representation learning on large graphs,” in Advances in Neural Information Processing Systems, 2017.
- M. McPherson, L. Smith-Lovin, and J. M. Cook, “Birds of a feather: Homophily in social networks,” Annual Review of Sociology, vol. 27, no. 1, pp. 415–444, 2001.
- Q. Wang, W. Zhao, J. Yang, J. Wu, S. Xue, Q. Xing, and P. S. Yu, “C-deeptrust: A context-aware deep trust prediction model in online social networks,” IEEE Transactions on Neural Networks and Learning Systems, vol. 34, no. 6, pp. 2767–2780, 2023.
- J. Zhu, Y. Yan, L. Zhao, M. Heimann, L. Akoglu, and D. Koutra, “Beyond homophily in graph neural networks: Current limitations and effective designs,” in Advances in Neural Information Processing Systems, 2020, pp. 1–15.
- J. Tang, H. Gao, X. Hu, and H. Liu, “Exploiting homophily effect for trust prediction,” in Proceedings of the 6th ACM International Conference on Web Search and Data Mining, 2013, pp. 53–62.
- Y. Zhang, V. Zhong, D. Chen, G. Angeli, and C. D. Manning, “Position-aware attention and supervised data improve slot filling,” in Conference on Empirical Methods in Natural Language Processing, 2017.
- A. Lewkowycz and G. Gur-Ari, “On the training dynamics of deep networks with l_2𝑙_2l\_2italic_l _ 2 regularization,” in Advances in Neural Information Processing Systems, 2020, pp. 4790–4799.
- D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” in 3rd International Conference on Learning Representations (ICLR), 2015.
- D. Duan, L. Tong, Y. Li, J. Lu, L. Shi, and C. Zhang, “Aane: Anomaly aware network embedding for anomalous link detection,” in 2020 IEEE International Conference on Data Mining (ICDM), 2020, pp. 1002–1007.
- Z. Liu, W. Zuo, D. Zhang, and X. Feng, “Rgse: Robust graph structure embedding for anomalous link detection,” IEEE Transactions on Big Data, vol. 9, no. 5, pp. 1420–1429, 2023.
- X. Ma, J. Wu, S. Xue, J. Yang, C. Zhou, Q. Z. Sheng, H. Xiong, and L. Akoglu, “A comprehensive survey on graph anomaly detection with deep learning,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 12, pp. 12 012–12 038, 2023.
- C. Mo, S. Li, G. K. Tso, J. Zhou, Y. Qi, and M. Zhu, “Motif-aware temporal gcn for fraud detection in signed cryptocurrency trust networks,” arXiv preprint arXiv:2211.13123, 2022.
- X. Yin, W. Lin, K. Sun, C. Wei, and Y. Chen, “A2s2-gnn: Rigging gnn-based social status by adversarial attacks in signed social networks,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 206–220, 2022.
- A. Luque, A. Carrasco, A. Martín, and A. de Las Heras, “The impact of class imbalance in classification performance metrics based on the binary confusion matrix,” Pattern Recognition, vol. 91, pp. 216–231, 2019.
- S. Min, Z. Gao, J. Peng, L. Wang, K. Qin, and B. Fang, “Stgsn—a spatial–temporal graph neural network framework for time-evolving social networks,” Knowledge-Based Systems, vol. 214, no. 106746, 2021.
- R. Rossi and N. Ahmed, “The network data repository with interactive graph analytics and visualization,” in Proceedings of the 29th AAAI Conference on Artificial Intelligence, 2015, pp. 4292–4293. [Online]. Available: https://networkrepository.com
- K. Sharma, R. Trivedi, R. Sridhar, and S. Kumar, “Temporal dynamics-aware adversarial attacks on discrete-time dynamic graph models,” in Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023, pp. 2023–2035.
- J. Chen, J. Zhang, Z. Chen, M. Du, and Q. Xuan, “Time-aware gradient attack on dynamic network link prediction,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 2, pp. 2091–2102, 2023.
- H. Zhang, B. Wu, X. Yuan, S. Pan, H. Tong, and J. Pei, “Trustworthy graph neural networks: Aspects, methods and trends,” arXiv preprint arXiv:2205.07424, 2022.
- Jie Wang (480 papers)
- Zheng Yan (116 papers)
- Jiahe Lan (4 papers)
- Elisa Bertino (42 papers)
- Witold Pedrycz (67 papers)