Next Article in Journal
Integration Strategy and Tool between Formal Ontology and Graph Database Technology
Previous Article in Journal
Single-Stage Wireless Battery Charging Circuit with Coupling Coefficient Prediction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense

College of Intelligence Science and Technology, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(21), 2614; https://doi.org/10.3390/electronics10212614
Submission received: 25 September 2021 / Revised: 20 October 2021 / Accepted: 24 October 2021 / Published: 26 October 2021
(This article belongs to the Section Networks)

Abstract

:
Heterogeneous networks are powerful tools for describing different types of entities and relationships and are more relevant models of complex networks. The study of heterogeneous network defense is of great practical significance for protecting useful networks such as military combat networks and critical infrastructure networks. However, a large amount of current research on complex network defense focuses on homogeneous networks under complete information conditions, which often ignore the real conditions such as incomplete information and heterogeneous networks. In this paper, we propose firstly a new adversarial hiding deception strategy for heterogeneous network defense under incomplete information conditions. Secondly, we propose an adversarial hiding deception network optimization method based on a genetic algorithm and design node importance index and a fitness function, which take into account the graph structure information and information about the type of nodes. Finally, we conduct comparison experiments for different defense strategies, and the results show that the proposed strategy and network optimization method are effective at hiding the critical nodes and inducing the attacker to attack the non-important nodes. The generated adversarial hiding deception network has a similar graph structure to the real network.

1. Introduction

Complex networks are a research paradigm that represents complex systems as network structures. Traditionally, complex networks have been studied mainly as homogeneous networks. However, in the real world, heterogeneous networks consisting of different types of entities and relationships are prevalent. However, in the real world, citation networks [1], social networks [2], recommender systems [3], cybersecurity [4] and military combat networks are composed of networks of different types of entities and relationships. Compared to homogeneous networks, heterogeneous networks can more accurately describe the different types of entities and relationships in these networks.
In the real world, unexpected incidents and malicious attacks against military combat networks, critical infrastructure networks, the Internet, and so forth, occur frequently. A large number of threats pose a serious challenge to the secure operation of these networks. We expect to avoid these threats by taking defense measures to make the networks operate safely and stably. Therefore, the study of complex network defense is of great practical importance to protecting network security.
Current research on complex network defense mainly includes: Pinyu Chen at National Taiwan University, assuming that each node has local detection capability and proposing a defense strategy for information fusion [5]; Xuejun Zhang from Beijing University, in Aeronautics and Astronautics, proposed a resource allocation algorithm for complex network defense based on a particle swarm algorithm [6]. The robustness of the network is closely related to the defense capability of the network, and many scholars have tried to enhance the defense capability of complex networks by optimizing the network structure to improve the robustness from the perspective of network structure robustness; Yehezkel from Bar-Ilan University, Israel, proposed the defense method of increasing links and analyzing the defense effect compared to low, medium, and high nodes [7]. Simply adding links can improve network structural robustness. Still, many scholars have questioned its economics and have proposed more optimal solutions to increase robustness with as few changes as possible to the current network structure; Schneider from ETH Zurich proposed a new robustness measure R. A network structure optimization algorithm for migrating active attack damage is presented, and this algorithm can improve the network structure robustness to a large extent by changing the network structure a little [8]; An Zeng of the University of Fribourg, Switzerland, proposed a link robustness measure Rl, based upon which he proposed a network structure optimization algorithm capable of defending against both node attacks and link attacks. An Zeng believed that the cost of changing the node degree is too high, so this algorithm does not change the degree of the network nodes in the optimization process [9]; Liang Bai of the National University of Defense Technology proposed an intelligent optimization scheme that can quickly improve the robustness of the network [10]. All of the above defense strategies assume that the attacker has access to the complete information; however, there is missing or false information obtained by the attacker in the real world. Moreover, improving robustness by modifying the structure of the real network itself is not only costly but also a completely reactive defense approach.
Therefore, some scholars think about improving the robustness of complex networks from the perspective of incomplete information. Jun Wu’s team at the National University of Defense Technology found that hiding a small number of network nodes can effectively improve network robustness and is more economical than simply adding links [11,12,13]. In their subsequent research, they explored network robustness under uncertain attack information [14]. They proposed a network robustness enhancement method based on node degree information perturbation [15]. Yehe of the University of Electronic Science and Technology enhances the robustness of complex networks through hidden links [16]. Yehezkel at Bar-Ilan University, Israel, similarly considers the degree of information about the node degree in possession of the attacker [7]. This part of the research explores improving networks’ robustness from the perspective of a hidden network structure, which opens up a new direction of complex network defense research under incomplete information conditions. However, no scholars have raised the complex network defense method from the passive defense form to the active state. Still, no scholars have proposed a proactive method for complex network defense based on hiding and deception.
In summary, the traditional complex network defense approach has the following four primary deficiencies: first, the assumption that the attacker knows the complete network information of the defender is not consistent with the real environment. It does not consider the characteristics of asymmetric information between attackers and defenders and exploits the impact of incomplete and false information on defense effectiveness. Second, the mainstream approach improves robustness by modifying the real network structure itself, which is an entirely reactive defense strategy and does not meet practical requirements. Third, traditional defense methods by changing the network structure are low concealment, high cost, and difficult to implement in real-world scenarios. Fourth, a large amount of current research on complex network defense focuses on homogeneous networks and does not target heterogeneous network defense research closer to the real-world networks.
To summarize, the research on heterogeneous network defense is a blank. This paper further conducts the network attack and defense research from incomplete information by adding hidden edges and deceptive edges to generate a disguised network and first proposes a proactive, heterogeneous network defense method that introduces incomplete information without changing the original network structure. First, in this paper, we propose an adversarial hiding deception strategy from the perspective of hiding deception by taking a heterogeneous combat network as the research object. Secondly, we propose an adversarial hiding deception network optimization method based on a genetic algorithm. Finally, we verify the effectiveness of our proposed method by comparing different defense strategies experimentally.
The structure of this paper is as follows. Section 2 describes the heterogeneous network defense problem. In Section 3, we introduce the adversarial hiding deception strategy proposed in this paper. Section 4 presents the adversarial hiding deception network optimization method based on a genetic algorithm. Section 5 shows the comparative experiments of the defense effect under the same attack strategy and analyzes the experimental results in detail. Finally, Section 6 discusses the conclusion.

2. Heterogeneous Network Defense Problem Description

2.1. Heterogeneous Combat Network

In this paper, we study the heterogeneous combat network (HCN), a special kind of heterogeneous network composed of different types of nodes and edges to represent various information flows between different combat entities. In this paper, we mainly study how to optimize the combat network from the defender’s point of view without considering the attacker’s entities, and therefore use Dekker’s proposed FINC [17] model to classify the combat forces on the battlefield into three categories: sensor entities, decision entities, and influence entities.
Definition 1.
Heterogeneous combat network (HCN) [18]: a G = ( V , E ) , where V = S D I = v 1 , v 2 , v 3 , v n represents node set and edge set E = e 1 , e 2 , e 3 , , e w   V × V represents information flow between functional entities. Specifically, all functional entities are divided into a set of sensor entities S = v 1 S , v 2 S , v 3 S , , v k S , a set of decision entities D = v 1 D , v 2 D , v 3 D , , v l D , and a set of influence entities I = v 1 I , v 2 I , v 3 I , , v p I . The variable N = | V | and W = | E | denote the number of nodes and edges in the combat network, and K = | S | , L = | D | , P = | I | , respectively, the number of sensor entities, the number of decision entities, and the number of influence entities. Different types of nodes provide different functions during combat. The operational capabilities of the sensor entity, decision entity, and impact entity are denoted as C A S , C A D and C A I . Figure 1 shows the heterogeneous combat network (HCN).

2.2. Disguised Network for Heterogeneous Network Defense

Under the condition of incomplete information, to interfere with the attacker’s access to real operational information in the process of reconnaissance and influence its critical decisions, the defender actively changes the information of the observation network characterized by the original complex network by hiding part of the information and adding false information to form a brand new observation network that selectively conveys the information of the defender’s network, calling this observation network a disguised network. This paper assumes that the incomplete information in the disguised network contains only active hidden information and active false information, and no random external interference is considered.
Definition 2.
Disguised network: a G = ( V , E ) , where V = S D I = v 1 , v 2 , v 3 , v n represents node set and edge set E = e 1 , e 2 , e 3 , , e w V × V represents the connected edges between nodes.The observation network G F = ( V F , E F ) constructed by the defender is the disguised network, where V F = V , E F =   E E D     E A , by setting the hidden edge E D and the deceptive edge E A , while keeping the number of nodes constant. Figure 2 shows the schematic diagram of the connected edge relationship between the disguised network and the real network.

3. Adversarial Hiding Deception Strategy

As shown in Figure 3, we set the real operational network of the defender, denoted as G T . Under the incomplete information condition, the attacker cannot reconnoiter the complete network information. Its reconnoitred network is the adversarial hiding deception network deployed by the defender, denoted as G F . The attack strategy of the attacker is denoted as A. Our objective is to solve the adversarial hiding deception network G F , deployed by the defender based on the real operational network.

3.1. Adversarial Hiding Deception Network Building

Hiding and deception are the core ideas of the adversarial hiding deception strategy, that is, to reduce the possibility of critical nodes in a complex network being targeted by the attacker as disintegration targets by setting hidden edges in the network and to increase the possibility of non-critical nodes in a complex network being targeted by the attacker as disintegration targets by setting deceptive edges. In the following, we further propose the definition of an adversarial hiding deception network based on the disguised network.
Definition 3.
Adversarial hiding deception network: a G = ( V , E ) , where the set V represents that there are | V | nodes and the set E represents that there are | E | connected edges. k x is the importance metric of node v x , which indicates the importance of node v x . Different attack strategies have different definitions for it, such as node degree, betweenness, giant connection component size (GCC), and so forth. The attacker uses a node-importance-first attack strategy to attack each node in | V | in descending order one by one. V ˜ V denotes the destroyed target nodes, E ˜ E denotes the connected edges that fail and are removed after node removal, and the network model after being attacked is G ˜ = ( V V ˜ , E E ˜ ) . Using some network performance measure R b , assuming that the higher R b the stronger the network performance, the performance of G under the node importance-first attack strategy can be expressed as R b ( G , G ˜ ) . G in R b denotes the target network under attack, and G ˜ in R b denotes the sequence of attacking nodes (indicating that the attack sequence originates from G).The defender constructs the network G F = ( V F , E F ) on the basis of the real network by setting the hidden edge E D and the deception edge E A is the disguised network, where V F = V , E F =   E E D     E A , where the camouflage network that can achieve the condition R b G , G F ˜ > R b ( G , G ˜ ) is called the adversarial hiding deception network.
As shown in Figure 3, in the adversarial hiding deception strategy, the attacker detects the disguised defender’s network and gets the observation network. The attacker formulates an attack strategy based on this observation network. In contrast, the defender effectively interferes with the attacker’s judgment by setting hidden edges and deceptive edges to achieve the purpose of defense.

3.2. Constraint Settings for Attacker and Defender

In order to be closer to the real combat scenario and according to the actual situation of both combat sides, we set the constraints of both attacker and defender based on the above constructed adversarial hiding deception network.

3.2.1. Attacker Constraint Settings

  • The attacker does not have complete information about the defender’s network. The network object attacked by the attacker is a disguised network observed by the attacker, that is, an adversarial hiding deception network set up by the defender;
  • Assume that the attacker uses the maximum degree attack (HDA) strategy for the attack;
  • The attack strategies all use node attacks. The attacker selects some nodes to attack, and when a node is successfully attacked, the edges attached to the node are also removed.

3.2.2. Defender Constraint Settings

  • The defender has complete information about its own network, but does not know the attack strategy adopted by the attacking party;
  • The defender must try to maintain the consistency of the network structure in the process of constructing the adversarial hiding deception network, and the unlimited setting of hidden and spoofing edges may greatly change the network structure in a way that is not true, and the number of changing edges must be limited [19]. Therefore, we set the total number of hidden edges and deceptive edges to be | E D | and | E A | , respectively, satisfying E D φ | E | = f D , E A φ | E | = f D , where | E | is the number of connected edges of the original network, φ is the defense factor, and f D is the defense strength;
  • The defender needs to consume a large amount of defense cost to defend, so we limit the number of nodes that the defender can defend to no more than 50 of the total number of network nodes.

3.3. Performance Index

3.3.1. Node Importance Index

For heterogeneous combat networks, this paper proposes a node importance index to evaluate the importance of nodes in heterogeneous combat networks by combining the structure and type information of nodes to determine the “critical nodes”, that is, the nodes we need to focus on protecting.
We believe that the importance of a node in a heterogeneous combat network consists of two main aspects: first, the graph structure information contained in the node, and second, the type of information contained in the node. For graph structure information, the node degree is the most direct and effective index to represent node graph structure information, so we use node degree d ( i ) to represent the graph structure information of nodes.
For type information, nodes of different types form combat chains through command communication relationships, and complete combat chains include combat capabilities against enemy targets. Therefore, we sum the capability values of all operational chains containing node i to h ( i ) to represent the type information of nodes. The calculation of the operational chain capability values is specified below. To accomplish a specific operational task, an operational chain (OC) is constructed by sensor entities, decision entities, and influence entities cooperating in an orderly manner [18].
Let l k be an operational chain (OC) containing sensor entity S = S k , decision entity D = D k , and influence entity I = I k . The operational capability of l k can be calculated as:
U l k = 1 l k j = S , D , I j k j C A j j k ,
where C A j j k , j = S , D , I denotes the detection capability of the sensor entity S k , the decision capability of the decision entity D k , and the destructive capability of the influence entity I k in the combat network, respectively, while | l k | denotes the length of the operational chain l k .
We sum the capability values of all the operational chains containing node i to obtain the node operational chain capability value h ( i ) .
h ( i ) = U l k .
Finally, we combine the graph structure information and type information of the nodes to obtain the node importance index, defined as follows:
I m ( i ) = d ( i ) + β h ( i ) ,
where d ( i ) is the degree of the node, β is the weight factor, and h ( i ) is the node operational chain capability value.

3.3.2. Network Performance Index

We use the normalized operational capability index C G as an evaluation index for the performance of heterogeneous combat networks. For a heterogeneous combat network G and a set of operational chains OCs, L G = l k , k = 1 , 2 , , m , the operational capability can be expressed as [18]:
O G = l k L G U l j ,
where O G is called the combat capability index of G. Then, we normalize O G to obtain:
C G = ln O G ˜ ln O G ,
where G ˜ is the post-attack network and G is the complete network consisting of N nodes. C G is the normalized operational capability index used to evaluate the operational capability of the post-attack heterogeneous combat network G ˜ .

3.4. Example of Adversarial Hiding Deception Strategy

The following is an example to demonstrate the adversarial hiding deception strategy in a communication network, where the nodes of the communication network are communication base stations and user terminals, and the connected edges are the wireless communication relationships between individual communication base stations, between communication base stations and users, and between users. Because the real communication network is too complex, each node is distributed in various locations in the city, and the wireless communication relationship between nodes is difficult to get through detection. So the attacker cannot obtain the real network topology directly, and the defender can easily construct an adversarial hiding deception network by setting hidden edges and deceptive edges. The attacker obtains the wireless communication relationship between the nodes by detecting the communication frequency and communication strength and then obtains the observed communication network. The defender’s hidden edge setting is implemented by decreasing the communication frequency and communication strength between nodes. The deceptive edge setting is implemented by increasing the communication frequency and communication strength between nodes. The following is a network example to demonstrate the construction process of the adversarial hiding deception network and its effectiveness. Suppose the original network consists of 21 nodes and 33 edges, that is, V = 21 , E = 33 , as shown in Figure 4. The three nodes with the highest degree are node 1, node 8, and node 10, and their degree values are d ( 1 ) = 9 , d ( 8 ) = 8 , and d ( 10 ) = 7 , respectively, and each of the three nodes are colored, and the higher the degree, the darker the color.
An adversarial hiding deception network is constructed as follows: all nodes remain unchanged, two real connected edges are hidden, represented by red dashed lines, and two deceptive edges are added, represented by green dashed lines. The formation process and results of the adversarial hiding deception network are shown in Figure 5.
As can be seen in Figure 5, the order of the three nodes with the highest degree in the original network is node 1, node 8 and node 9, while the order of the three nodes with the highest degree in the constructed adversarial hiding deception network changes to node 10, node 8 and node 1. Thus, the construction of the adversarial hiding deception network changes the original degree sequence compared to the node degree sequence of the original network. Under the complete information condition, the attacker perceives the completely true network information and calculates the attack order accordingly. Under the adversarial hiding deception network condition, the attacker perceives the adversarial hiding deception network information and calculates the attack order based on it, but it is the original network itself that is actually changed after the attack.

4. Adversarial Hiding Deception Network Optimization Method Based on Genetic Algorithm

4.1. Combinatorial Optimization Model for Adversarial Hiding Deception Strategy

The adversarial hiding deception strategy finds a set of hidden edges set E D and deceptive edges set E A , satisfying E F =   E E D     E A . The adversarial hiding deception network G F is generated based on the real network G such that R b G , G F ˜ > R b ( G , G ˜ ) is maximized.
Thus, finding the optimal adversarial hiding deception strategy on a heterogeneous network can be equated to solving the following combinatorial optimization model:
max R b G , G F ˜ R b ( G , G ˜ ) s . t . E F =   E E D     E A E D f D E A f D .

4.2. Adversarial Hiding Deception Network Optimization Method Based on Genetic Algorithm

In solving more complex combinatorial optimization problems, genetic algorithms can obtain better optimization results faster than some conventional optimization algorithms. In this paper, we design the Adversarial Hiding Deception Network optimization method based on a Genetic algorithm (Figure 6), called AHDNG.

4.2.1. Population Chromosome Encoding Design

The chromosome encoding of each individual in the population is a candidate solution. The chromosome encoding scheme is as follows: we compute the network’s adjacency matrix, take its upper triangular matrix, and expand it into a row vector as the chromosome encoding of the network.

4.2.2. Fitness Function Design

The fitness function value represents the score of each chromosome encoding. We use the fitness function to evaluate the degree of change in the importance of nodes before and after adjusting the strategy, that is, the evaluation of hiding ability for critical nodes and the assessment of deception ability for setting decoy nodes. We divide the fitness function into two parts, that is, the hiding ability f i t n e s s 1 and the deception ability f i t n e s s 2 . We define the fitness function as follows:
f i t n e s s = f i t n e s s 1 + f i t n e s s 2 f i t n e s s 1 = i = V I I m G ( i ) I m G F ( i ) f i t n e s s 2 = j V J I m G F ( j ) I m G ( j ) .

4.2.3. Selection Operation

The roulette wheel strategy is used for the selection operation. We apply an exponential transformation ( e x ) to the fitness value to make the fitness value positive. The larger the fitness value, the greater the ability to hide from critical nodes and the ability to deceive non-critical nodes, and the greater the probability of being selected.

4.2.4. Crossover Operation

In this paper, we use a single point crossover with a crossover rate of p c . Each individual in the selected population is traversed, and that individual is taken as the father, and another individual from the population is selected and taken as the mother. The crossover points are generated randomly, and the offspring genes are the result of the crossover between the father and mother genes.

4.2.5. Mutation Operation

After completing the crossover operation, a mutation operation is performed on the generated chromosome code. Each position in the chromosome code is traversed, and the mutation operation is performed according to the mutation rate p m . Specifically, a randomly selected position from the chromosome is generated by replacing “0” with “1”, that is, a deceptive edge is generated, and a randomly selected position is generated by replacing “1” with “0”, that is, to generate a hidden edge.
The algorithm pseudocode is is shown in Algorithm 1.
Algorithm 1 Adversarial hiding deception network optimization method based on genetic algorithm.
Input:
  1:
Real Network network G = ( V , E ) ;
  2:
Number of loops N g e n ;
  3:
Number of populations p o p _ n u m ;
  4:
Defense factor φ
Output:
  5:
Adversarial hiding deception network G F
  6:
C a l c u l a t e t h e a d j a c e n c y m a t r i x A o f G = ( V , E )
  7:
C a l c u l a t e t h e c h r o m o s o m a l c o d e p o p _ G o f G ( V , E )
  8:
C a l c u l a t e t h e l e n g t h o f t h e c o d e l e n _ p o p = | V | ( | V | 1 ) / 2
  9:
C a l c u l a t e d e f e n s e s t r e n g t h f D = φ | E |
10:
I n i t i a l i z a t i o n I m _ G _ r a n k = n u l l , z e r o _ l i s t = n u l l , o n e _ l i s t = n u l l
11:
for i f r o m 1 t o | V | do
12:
  C a l c u l a t i n g n o d e i m p o r t a n c e i n d e x I m ( i )
13:
  I m _ G _ r a n k = I m ( i ) % Ranking node importance indexes
14:
end for
15:
for j f r o m 1 t o p o p _ n u m do
16:
  if p o p _ G [ j ] = = 0 then
17:
  z e r o _ l i s t = j % Add the position 0 in p o p _ G to z e r o _ l i s t
18:
  else
19:
  o n e _ l i s t = j % Add the position 1 in p o p _ G to o n e _ l i s t
20:
  end if
21:
end for
22:
for k f r o m 1 t o l e n ( z e r o _ l i s t ) do
23:
  e d g e _ a = r a n d o m . s a m p l e ( z e r o _ l i s t )
24:
  p o p _ G [ e d g e _ a ] = 1 % Randomly take f D positions from zero_list to set deceptive edges
25:
  p o p _ a = p o p _ G
26:
end for
27:
for m f r o m 1 t o l e n ( o n e _ l i s t ) do
28:
  e d g e _ d = r a n d o m . s a m p l e ( o n e _ l i s t )
29:
  p o p _ a [ e d g e _ d ] = 0 % Randomly take f D positions from one_list to set deceptive edges
30:
  p o p _ d = p o p _ a % Generate initial populations
31:
end for
32:
for n f r o m 1 t o N _ g e n do
33:
  for p f r o m 1 t o p o p _ n u m do
34:
  C a l c u l a t i n g t h e f i t n e s s o f t h e p o p u l a t i o n c o d e f i t n e s s [ p o p _ d [ p ] ]
35:
  end for
36:
  p o p _ s = s e l e c t ( p o p _ d ) %Selection operation
37:
  p o p _ c = c r o s s o v e r ( p o p _ s ) %Crossover operation
38:
  p o p _ m = m u t a t i o n ( p o p _ c ) %Mutation operation
39:
  p o p _ n e x t = p o p _ m %Generate child codes
40:
  while k f r o m 1 t o l e n ( z e r o _ l i s t ) is False %Determine whether the child codes satisfies the constraint
41:
  p o p _ n e x t = c r o s s o v e r ( p o p _ n e x t )
42:
  p o p _ n e x t = m u t a t i o n ( p o p _ n e x t )
43:
  end while
44:
end for
45:
for t f r o m 1 t o p o p _ n u m do
46:
  C a l c u l a t i n g t h e f i t n e s s o f t h e p o p u l a t i o n c o d e f i t n e s s [ p o p _ d [ t ] ]
47:
  p o p _ b e s t = a r g m a x ( f i t n e s s [ p o p _ d [ t ] ] ) %Obtain the optimal code
48:
end for
49:
A F = A d j ( p o p _ b e s t ) %Calculate the adjacency matrix of the optimal code
50:
G F = g r a p h ( A F )
51:
return G F .

4.3. Degree Distribution Examination

The degree distribution of a network is an important feature reflecting the network’s structure; therefore, we examine the degree distribution of the generated adversarial hidden spoofing network against the original network to ensure that the degree of variation in the network structure is within a reasonable range.
Noting that most real-world networks obey power-law distributions, we refer to the power-law distribution estimation method proposed in the literature [20,21] to estimate whether the two degree distributions of G and G F are from the same distribution.

5. Experimental Results and Analysis

First, we conduct a disintegration comparison experiment between the original undefended network and the network defended with AHDNG to verify the effectiveness of the proposed method. Secondly, this paper uses the undefended original network as a benchmark for two defense methods: the AHDNG and the random disguised defense method to conduct comparative experiments to verify that the proposed method outperforms the existing methods.

5.1. Data Description

We use the B-A model [22] to generate the heterogeneous combat network as a defense object. The network data are presented in Table 1.

5.2. Experimental Results and Analysis of Adversarial Hiding Deception Network Defense

Figure 7a shows the real network and Figure 5b shows the adversarial hiding deception network generated using AHDNG. The basic topological characteristics of the network are shown in Table 2. First, the attacker uses HDA to disintegrate the original network and the adversarial hiding deception network, respectively, and the obtained sequence of disintegrate nodes G ˜ and G F ˜ . Second, the combat capability indices C T and C F are calculated separately for disintegrating the original network using the sequence of disintegrating nodes G ˜ and G F ˜ ; the results are shown in Figure 8. Figure 8 shows the process of HDA disintegrating the original network using the sequence of attack nodes G ˜ and G F ˜ , respectively, from which we can see that, in the initial stage of disintegrating, the operational capability of the real network before and after defense is basically the same. When the attack strength f N is greater than 0.15, the nodes with high importance ranking in the undefended real network are dismantled first. In contrast, the real network defended by adversarial hiding deception induces the attacker to disintegrate the real nodes with low importance ranking in the network. When the attack strength f N is greater than 0.25, the operational capability of the undefended real network is already 0. In contrast, the real network defended by adversarial hiding deception still has multiple complete operational chains and maintains an operational capability of about 0.56. Table 3 shows the node sequence comparison of the attacker’s disintegration of the original network before and after the defense. Combined with Figure 7, we can see that the disintegration node sequence changes from G ˜ to G F ˜ , and the attacker’s sequence of nodes that disintegrate the original network is successfully induced.

5.3. Experimental Results and Analysis of Different Defense Method under the Same Attack Strategy

Under the HDA attack strategy, we use random disguised defense and AHDNG, respectively. The results are shown in Figure 9. Analyzing the experimental results, the defense effect of the adversarial hiding deception network and the defense effect of the random disguise defense network are basically the same as the real network at the beginning of the disintegration phase, and the analysis is because we limit the number of hidden edges and deceptive edges set in the process of generating the adversarial hiding deception network. Therefore, the process of setting hidden and deceptive edges cannot be overly modified for a few nodes, and the effect of disguise is not obvious for nodes with high node importance in the original network. When the defense effectiveness of the adversarial hiding deception network is significantly better than that of the real network when the attack strength f N is greater than 0.13, this is due to the fact that, by setting the hidden and deceptive edges, we hide the nodes with high node importance in the real network and set the nodes with low node importance in the real network as decoy targets to actively expose, thus inducing the attacker to attack the non-important nodes. It can be seen that, when the attack strength f N is greater than 0.20, the defense effect of the adversarial hiding deception network is significantly better than that of the random disguise defense network. When the attack strength f N is greater than 0.25, the operational capability of the real network is already 0. The operational capability of the real network with random disguise defense remains around 0.30, while the operational capability of the real network with adversarial hiding deception strategy defense remains around 0.56, which indicates the effectiveness of the adversarial hiding deception strategy defense. The ability of the random disguised defense network to resist HDA attacks is basically the same as that of the real network. This is due to the fact that randomly set hidden edges and deceptive edges cannot be targeted to defend important nodes in the real network, but the defense capability is scattered among the nodes, resulting in ineffective defense.

5.4. Degree Distribution Examination

We use the degree distribution to test the similarity of the graph structure of the adversarial hidden spoofing network to the real network. Assuming that the data come from a power-law distribution with x x min , we can derive the maximum likelihood estimate (MLE) for parameter α . Although there is no exact expression for the MLE in the discrete case, we can use the approximation of rounding to the nearest integer for the power-law distribution to obtain, from Equation (5) [21], the coefficients of the degree distributions of the real network and the adversarial hiding deception network are calculated as α G = 3.27 and α G F = 3.22 , respectively. Therefore, we can consider that both the real network and the adversarial hiding deception network come from a power-law distribution with coefficient α = 3 .
α G = 1 + V G d i D G ln d i d min 1 2 1 ,
where d min denotes the minimum degree of nodes in the network G, D G is the set of node degrees, and | V G | is the total number of nodes. Figure 8 shows the degree distribution of the real network and the adversarial hiding deception network. From Figure 10, we can visualize that the degree distributions of the two networks are consistent.

6. Conclusions

The contributions and innovations of this paper are mainly in the following four areas.
  • In this paper, we first proposed a heterogeneous network defense strategy based on hiding and deception under incomplete information, that is, an adversarial hiding deception strategy. This strategy is the first study for heterogeneous network defense. We build an adversarial hiding deception network to hide the critical nodes in the network and induce the attacker to attack the non-important nodes, which breaks the limitation of the traditional passive defense strategy and realizes the active defense of the network;
  • This paper proposed the adversarial hidden spoofing strategy. The traditional defense strategy defends by modifying the network structure, which consumes many costs and is difficult to implement. Instead of adjusting the network structure itself, the adversarial hidden deception strategy takes advantage of the information asymmetry and presents the hiding deception network to the adversary by setting up false information.
  • We design node importance metric and fitness functions for heterogeneous operational networks, considering the graph structure information and type information of nodes. Based on this, we propose an adversarial hiding deception network optimization method based on a genetic algorithm;
  • Through comparative experiments, we demonstrate that the defense effectiveness of the proposed adversarial hiding deception network is significantly improved compared to the real network. Under the same attack strategy, we compare the disintegration results of the undefended original network, the network with a random disguised defense method, and the network with an AHDNG defense, and the results show that the AHDNG proposed in this paper has a better defense effect. We also demonstrate that the generated adversarial hiding deception network has a similar graph structure to the real network using the degree distribution test.

Author Contributions

C.W. and C.Z. participated in designing the method, analysis and manuscript preparation; C.W. visualized the experimental results; H.L. and J.C. guided the students to complete the research; H.L. has done a complete revision of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

The authors are grateful for the financial support received from National Natural Science Foundation of China (NSFC) Young Science Foundation (Grant No. 61806212) and Natural Science Foundation of Hunan Province Young Science Foundation(Grant No. 2019JJ50724).

Institutional Review Board Statement

The study did not involve humans or animals.

Informed Consent Statement

The study did not involve humans.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yasunaga, M.; Kasai, J.; Zhang, R.; Fabbri, A.R.; Li, I.; Friedman, D.; Radev, D. Scisummnet: A large annotated corpus and content-impact models for scientific paper summarization with citation networks. In Proceedings of the AAAI Conference on Artificial Intelligence, Honolulu, HI, USA, 27 January–1 February 2019; pp. 7386–7393. [Google Scholar]
  2. Tajeuna, E.G.; Bouguessa, M.; Wang, S. Modeling and predicting community structure changes in time-evolving social networks. IEEE Trans. Knowl. Data Eng. 2018, 3, 1166–1180. [Google Scholar] [CrossRef]
  3. Shi, C.; Hu, B.; Zhao, X.; Yu, P. Heterogeneous information network embedding for recommendation. IEEE Trans. Knowl. Data Eng. 2018, 31, 357–370. [Google Scholar] [CrossRef] [Green Version]
  4. Hou, S.; Ye, Y.; Song, Y.; Abdulhayoglu, M. Hindroid: An intelligent android malware detection system based on structured heterogeneous information network. In Proceedings of the 23rd ACM SIGKDD International Conference, Halifax, NS, Canada, 13–17 August 2017. [Google Scholar]
  5. Chen, P.Y.; Chen, K.C. Intentional attack and fusion-based defense strategy in complex networks. In Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM, Houston, TX, USA, 5–9 December 2011. [Google Scholar]
  6. Zhang, X.; Xu, G.; Xia, Y. Optimal defense resource allocation in scale-free networks. Phys. A Stat. Mech. Appl. 2018, 492, 2198–2204. [Google Scholar] [CrossRef]
  7. Yehezkel, A.; Cohen, R. Degree-based attacks and defense strategies in complex networks. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 2012, 86, 066114. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Schneider, C.M.; Moreira, A.A.; Andrade, J.S.; Havlin, S.; Herrmann, H.J. Mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. USA 2011, 108, 3838–3841. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  9. Zeng, A.; Liu, W. Enhancing network robustness for malicious attacks. Physics 2012, 85, 3112–3113. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Bai, L.; Xiao, Y.D.; Hou, L.L.; Lao, S.Y. Smart rewiring: Improving network robustness faster. Chin. Phys. Lett. 2015, 32, 218–222. [Google Scholar] [CrossRef]
  11. Wu, J.; Deng, H.Z.; Tan, Y.J.; Zhu, D.Z. Vulnerability of complex networks under intentional attack with incomplete information. J. Phys. A Math. Theor. 2007, 40, 2665. [Google Scholar] [CrossRef]
  12. Wu, J.; Deng, H.Z.; Tan, Y.J.; Li, Y.; Zhu, D.Z. Attack vulnerability of complex networks based on local information. Mod. Phys. Lett. B 2007, 21, 1007–1014. [Google Scholar] [CrossRef]
  13. Wu, J.; Tan, Y.J.; Deng, H.Z.; Li, Y. A robustness model of complex networks with tunable attack information parameter. Chin. Phys. Lett. 2007, 24, 2138. [Google Scholar]
  14. Li, J.; Wu, J.; Li, Y.; Deng, H.Z.; Tan, Y.J. Attack robustness of scale-free networks based on grey information. Chin. Phys. Lett. 2011, 28, 058904. [Google Scholar] [CrossRef]
  15. Wu, J.; Tan, S.Y.; Liu, Z.; Tan, Y.J.; Lu, X. Enhancing structural robustness of scale-free networks by information disturbance. Sci. Rep. 2017, 7, 7559. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Zhuo, Y.; Peng, Y.; Liu, C.; Liu, Y.; Long, K. Improving the attack tolerance of scale-free networks by adding and hiding edges. Phys. Scr. 2011, 83, 25801. [Google Scholar] [CrossRef]
  17. Dekker, A.H. Measuring the agility of networked military forces. J. Battlef. Technol. 2006, 9, 19–24. [Google Scholar]
  18. Li, J.; Jiang, J.; Yang, K.; Chen, Y. Research on functional robustness of heterogeneous combat networks. IEEE Syst. J. 2018, 13, 1487–1495. [Google Scholar] [CrossRef]
  19. Dai, H.; Li, H.; Tian, T.; Huang, X.; Wang, L.; Zhu, J.; Song, L. Adversarial attack on graph structured data. PMLR 2018, 80, 1115–1124. [Google Scholar]
  20. Bessi, A. Two samples test for discrete power-law distributions. arXiv 2015, arXiv:1503.00643. [Google Scholar]
  21. Clauset, A.; Shalizi, C.R.; Newman, M. Power-law distributions in empirical data. SIAM Rev. 2009, 51, 51–55. [Google Scholar] [CrossRef] [Green Version]
  22. Barabási, A.L.; Albert, R. AL Barabási and Albert, R. Emergence of scaling in random networks. Science 1999, 286, 54–65. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. Schematic diagram of a heterogeneous combat network. Node S denotes the sensor entity, node D denotes the decision entity, and node I denotes the influence entity.
Figure 1. Schematic diagram of a heterogeneous combat network. Node S denotes the sensor entity, node D denotes the decision entity, and node I denotes the influence entity.
Electronics 10 02614 g001
Figure 2. Edge relationship between the disguised network and the real network.
Figure 2. Edge relationship between the disguised network and the real network.
Electronics 10 02614 g002
Figure 3. Schematic diagram of the adversarial hiding deception strategy.
Figure 3. Schematic diagram of the adversarial hiding deception strategy.
Electronics 10 02614 g003
Figure 4. Original network.
Figure 4. Original network.
Electronics 10 02614 g004
Figure 5. (a) shows the construction process of the adversarial hiding deception network, the hidden edges are represented by red dashed lines and the deceptive edges are represented by green dashed lines, the higher the degree value the darker the node color. (b) shows the constructed adversarial hiding deception network, the higher the degree value the darker the node color.
Figure 5. (a) shows the construction process of the adversarial hiding deception network, the hidden edges are represented by red dashed lines and the deceptive edges are represented by green dashed lines, the higher the degree value the darker the node color. (b) shows the constructed adversarial hiding deception network, the higher the degree value the darker the node color.
Electronics 10 02614 g005
Figure 6. Schematic diagram of the adversarial hiding deception network optimization.
Figure 6. Schematic diagram of the adversarial hiding deception network optimization.
Electronics 10 02614 g006
Figure 7. Real network and adversarial hiding deception network. (a) is the real network, (b) is the adversarial hiding deception network.
Figure 7. Real network and adversarial hiding deception network. (a) is the real network, (b) is the adversarial hiding deception network.
Electronics 10 02614 g007
Figure 8. Comparison of the process of HDA dismantling real network and adversarial hiding deception network. (a) is the HDA attack real network result curve, (b) is the network where HDA is used to attack 4 nodes, C G = 0.84, (c) is the network where HDA is used to attack 13 nodes, C G = 0.63, (d) is the network where HDA is used to attack 26 nodes, C G = 0. (e) is the HDA attack adversarial hiding deception network result curve, (f) is the network where HDA is used to attack 4 nodes, C G = 0.84; (g) is the network where HDA is used to attack 13 nodes, C G = 0.69, (h) is the network where HDA is used to attack 26 nodes, C G = 0.53.
Figure 8. Comparison of the process of HDA dismantling real network and adversarial hiding deception network. (a) is the HDA attack real network result curve, (b) is the network where HDA is used to attack 4 nodes, C G = 0.84, (c) is the network where HDA is used to attack 13 nodes, C G = 0.63, (d) is the network where HDA is used to attack 26 nodes, C G = 0. (e) is the HDA attack adversarial hiding deception network result curve, (f) is the network where HDA is used to attack 4 nodes, C G = 0.84; (g) is the network where HDA is used to attack 13 nodes, C G = 0.69, (h) is the network where HDA is used to attack 26 nodes, C G = 0.53.
Electronics 10 02614 g008
Figure 9. Comparison of defense results of different defense methods under the same attack strategy. The blue line indicates the result of HDA direct attack on the original network G, the green line indicates the result of HDA attack on the original network G F 1 defended by the AHDNG, and the magenta line indicates the result of HDA attack on theoriginal network G F 2 defended by the random disguised defense.
Figure 9. Comparison of defense results of different defense methods under the same attack strategy. The blue line indicates the result of HDA direct attack on the original network G, the green line indicates the result of HDA attack on the original network G F 1 defended by the AHDNG, and the magenta line indicates the result of HDA attack on theoriginal network G F 2 defended by the random disguised defense.
Electronics 10 02614 g009
Figure 10. Degree distribution of real network and adversarial hiding deception network.The blue line indicates the degree distribution of the real network G, and the green line indicates the degree distribution of the adversarial hiding deception network G F .
Figure 10. Degree distribution of real network and adversarial hiding deception network.The blue line indicates the degree distribution of the real network G, and the green line indicates the degree distribution of the adversarial hiding deception network G F .
Electronics 10 02614 g010
Table 1. Heterogeneous combat network attributes.
Table 1. Heterogeneous combat network attributes.
Node TypeNumber of NodesNode Operational Capability
Sensor node (S)552
Decision node (D)122
Influence node (I)302
Table 2. Basic network topology characteristics include Network size N, edge number E, average degree <k>, average path length <d>, clustering coefficient C.
Table 2. Basic network topology characteristics include Network size N, edge number E, average degree <k>, average path length <d>, clustering coefficient C.
NetworkNE<k>C<d>
Real Network971903.9180.1162.924
Adversarial hiding deception network971903.9180.0842.983
Table 3. Comparison of disintegration node sequences before and after defense.
Table 3. Comparison of disintegration node sequences before and after defense.
G ˜ 2-1-19-7-3-5-17-0-14-23-10-4-63-31-6-86-66-58-48-39-21-20-16-92-71-57
G F ˜ 2-1-19-7-5-3-17-0-23-10-21-14-4-31-6-86-66-63-48-39-20-16-92-90-74-58
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, C.; Zeng, C.; Liu, H.; Chen, J. Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense. Electronics 2021, 10, 2614. https://doi.org/10.3390/electronics10212614

AMA Style

Wang C, Zeng C, Liu H, Chen J. Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense. Electronics. 2021; 10(21):2614. https://doi.org/10.3390/electronics10212614

Chicago/Turabian Style

Wang, Chen, Chengyi Zeng, Hongfu Liu, and Jing Chen. 2021. "Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense" Electronics 10, no. 21: 2614. https://doi.org/10.3390/electronics10212614

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop