Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Mitigating Cascading Effects in Large Adversarial Graph Environments (2404.14418v1)

Published 12 Apr 2024 in cs.SI, cs.AI, cs.LG, and cs.MA

Abstract: A significant amount of society's infrastructure can be modeled using graph structures, from electric and communication grids, to traffic networks, to social networks. Each of these domains are also susceptible to the cascading spread of negative impacts, whether this be overloaded devices in the power grid or the reach of a social media post containing misinformation. The potential harm of a cascade is compounded when considering a malicious attack by an adversary that is intended to maximize the cascading impact. However, by exploiting knowledge of the cascading dynamics, targets with the largest cascading impact can be preemptively prioritized for defense, and the damage an adversary can inflict can be mitigated. While game theory provides tools for finding an optimal preemptive defense strategy, existing methods struggle to scale to the context of large graph environments because of the combinatorial explosion of possible actions that occurs when the attacker and defender can each choose multiple targets in the graph simultaneously. The proposed method enables a data-driven deep learning approach that uses multi-node representation learning and counterfactual data augmentation to generalize to the full combinatorial action space by training on a variety of small restricted subsets of the action space. We demonstrate through experiments that the proposed method is capable of identifying defense strategies that are less exploitable than SOTA methods for large graphs, while still being able to produce strategies near the Nash equilibrium for small-scale scenarios for which it can be computed. Moreover, the proposed method demonstrates superior prediction accuracy on a validation set of unseen cascades compared to other deep learning approaches.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (33)
  1. Maximizing resilience under defender attacker model in heterogeneous multi-networks. In 2020 3rd International Conference on Data Intelligence and Security (ICDIS), pages 117–126. IEEE, 2020.
  2. Dota 2 with large scale deep reinforcement learning. arXiv preprint arXiv:1912.06680, 2019.
  3. Threshold models for competitive influence in social networks. In Internet and Network Economics: 6th International Workshop, WINE 2010, Stanford, CA, USA, December 13-17, 2010. Proceedings 6, pages 539–550. Springer, 2010.
  4. Kerry Breen. North carolina attacks underscore power grid vulnerabilities: ‘destroying this infrastructure can have a crippling effect’. CBS News, 2022.
  5. Woulda, coulda, shoulda: Counterfactually-guided policy search. arXiv preprint arXiv:1811.06272, 2018.
  6. Attack-defense game for critical infrastructure considering the cascade effect. Reliability Engineering & System Safety, 216:107958, 2021.
  7. Gccad: Graph contrastive learning for anomaly detection. IEEE Transactions on Knowledge and Data Engineering, 2022.
  8. Distribution knowledge embedding for graph pooling. IEEE Transactions on Knowledge and Data Engineering, 2022.
  9. A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks. International Journal of Critical Infrastructure Protection, 36:100494, 2022.
  10. A novel privacy preserving framework for large scale graph data publishing. IEEE transactions on knowledge and data engineering, 33(2):331–343, 2019.
  11. Contagion in financial networks. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 466(2120):2401–2423, 2010.
  12. Green lights forever: Analyzing the security of traffic infrastructure. WOOT, 14:7–7, 2014.
  13. Enhancing factorization machines with generalized metric learning. IEEE Transactions on Knowledge and Data Engineering, 34(8):3740–3753, 2020.
  14. Reinforcement-learning-based dynamic defense strategy of multistage game against dynamic load altering attack. International Journal of Electrical Power & Energy Systems, 131:107113, 2021.
  15. Deep reinforcement learning from self-play in imperfect-information games. arXiv preprint arXiv:1603.01121, 2016.
  16. Using the disaster spreading theory to analyze the cascading failure of urban rail transit network. Reliability Engineering & System Safety, 215:107825, 2021.
  17. Reducing cascading failure risk by increasing infrastructure network interdependence. Scientific reports, 7(1):1–13, 2017.
  18. Attack and defense strategies in complex networks based on game theory. Journal of Systems Science and Complexity, 32(6):1630–1640, 2019.
  19. Influence maximization on social graphs: A survey. IEEE Transactions on Knowledge and Data Engineering, 30(10):1852–1872, 2018.
  20. Sample-efficient reinforcement learning via counterfactual-based data augmentation. arXiv preprint arXiv:2012.09092, 2020.
  21. Fast failure recovery in vertex-centric distributed graph processing systems. IEEE Transactions on Knowledge and Data Engineering, 31(4):733–746, 2018.
  22. A learning-based solution for an adversarial repeated game in cyber–physical power systems. IEEE transactions on neural networks and learning systems, 31(11):4512–4523, 2019.
  23. Counterfactual data augmentation using locally factored dynamics. Advances in Neural Information Processing Systems, 33:3976–3990, 2020.
  24. Mastering the game of go with deep neural networks and tree search. nature, 529(7587):484–489, 2016.
  25. Mastering chess and shogi by self-play with a general reinforcement learning algorithm. arXiv preprint arXiv:1712.01815, 2017.
  26. Grandmaster level in starcraft ii using multi-agent reinforcement learning. Nature, 575(7782):350–354, 2019.
  27. Attack-defense game analysis of critical infrastructure network based on cournot model with fixed operating nodes. International Journal of Critical Infrastructure Protection, 40:100583, 2023.
  28. Stochastic games for power grid protection against coordinated cyber-physical attacks. IEEE Transactions on Smart Grid, 9(2):684–694, 2016.
  29. Network embedding via coupled kernelized multi-dimensional array factorization. IEEE Transactions on Knowledge and Data Engineering, 32(12):2414–2425, 2019.
  30. Q-learning-based vulnerability analysis of smart grid against sequential topology attacks. IEEE Transactions on Information Forensics and Security, 12(1):200–210, 2016.
  31. Transportation networks cascading failures modeling under emergency environment. In Proceedings of the Sixteenth International Conference on Management Science and Engineering Management–Volume 1, pages 43–56. Springer, 2022.
  32. Labeling trick: A theory of using graph neural networks for multi-node representation learning. Advances in Neural Information Processing Systems, 34:9061–9073, 2021.
  33. Graph convolutional networks: a comprehensive review. Computational Social Networks, 6(1):1–23, 2019.

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com