attack 2025

Budgeted Adversarial Attack against Graph-Based Anomaly Detection in Sensor Networks

Sanju Xaviar , Omid Ardakanian

0 citations · 45 references · arXiv

α

Published on arXiv

2509.17987

Input Manipulation Attack

OWASP ML Top 10 — ML01

Key Finding

BETA reduces GNN-based anomaly detection accuracy by 30.62–39.16% on average while operating within realistic budget and stealth constraints, significantly outperforming baseline attack strategies

BETA

Novel technique introduced


Graph Neural Networks (GNNs) have emerged as powerful models for anomaly detection in sensor networks, particularly when analyzing multivariate time series. In this work, we introduce BETA, a novel grey-box evasion attack targeting such GNN-based detectors, where the attacker is constrained to perturb sensor readings from a limited set of nodes, excluding the target sensor, with the goal of either suppressing a true anomaly or triggering a false alarm at the target node. BETA identifies the sensors most influential to the target node's classification and injects carefully crafted adversarial perturbations into their features, all while maintaining stealth and respecting the attacker's budget. Experiments on three real-world sensor network datasets show that BETA reduces the detection accuracy of state-of-the-art GNN-based detectors by 30.62 to 39.16% on average, and significantly outperforms baseline attack strategies, while operating within realistic constraints.


Key Contributions

  • BETA: a novel grey-box budgeted evasion attack against GNN-based anomaly detectors that restricts perturbations to a limited subset of non-target sensor nodes
  • Influence-based node selection strategy that identifies sensors most critical to the target node's classification using graph structure
  • Empirical evaluation across three real-world sensor network datasets demonstrating 30.62–39.16% average reduction in detection accuracy

🛡️ Threat Analysis

Input Manipulation Attack

BETA is an inference-time evasion attack that crafts adversarial perturbations to sensor feature inputs, causing GNN-based anomaly detectors to misclassify — either suppressing true anomalies or triggering false alarms — using grey-box gradient/influence information to identify the most impactful nodes within a budget constraint.


Details

Domains
graphtimeseries
Model Types
gnn
Threat Tags
grey_boxinference_timetargeteddigital
Datasets
three real-world sensor network datasets (specific names not provided in excerpt)
Applications
anomaly detectionsensor network monitoringmultivariate time series classification