(a) Characterization of malicious insertion attacks on digit frequency (, attack rate = 10%) |
| | | | | | Δ | Δ | Characteristic |
| 0 | 8.44 | 247345 | 8.40 | 270858 | 23513 | +9.51% | ↑Low to High | 1 | 16.28 | 477362 | 16.37 | 527535 | 50173 | +10.51% | ↑Low to High | 2 | 19.88 | 582616 | 19.97 | 643745 | 61129 | +10.49% | ↑Low to High | 3 | 11.37 | 333378 | 11.34 | 365471 | 32093 | +9.63% | ↑Low to High | 4 | 8.83 | 258748 | 8.79 | 283251 | 24503 | +9.47% | ↑Low to High | 5 | 8.31 | 243554 | 8.24 | 265510 | 21956 | +9.01% | ↑Low to High | 6 | 7.14 | 209399 | 7.09 | 228418 | 19019 | +9.08% | ↑Low to High | 7 | 6.40 | 187586 | 6.41 | 206659 | 19073 | +10.17% | ↑Low to High | 8 | 6.49 | 190268 | 6.51 | 209737 | 19469 | +10.23% | ↑Low to High | 9 | 6.86 | 201050 | 6.88 | 221653 | 20603 | +10.25% | ↑Low to High |
|
|
(b) Characterization of malicious insertion attacks on digit frequency (, attack rate = 90%) |
| | | | | | Δ | Δ | Characteristic |
| 0 | 8.44 | 247345 | 8.51 | 471852 | 224507 | +90.77% | ↑Low to High | 1 | 16.28 | 477362 | 16.73 | 928331 | 450969 | +94.47% | ↑Low to High | 2 | 19.88 | 582616 | 19.97 | 1107797 | 525181 | +90.14% | ↑Low to High | 3 | 11.37 | 333378 | 11.70 | 649150 | 315772 | +94.72% | ↑Low to High | 4 | 8.83 | 258748 | 8.57 | 475532 | 216784 | +83.78% | ↑Low to High | 5 | 8.31 | 243554 | 7.99 | 443279 | 199725 | +82.00% | ↑Low to High | 6 | 7.14 | 209399 | 6.86 | 380768 | 171369 | +81.84% | ↑Low to High | 7 | 6.40 | 187586 | 6.36 | 353031 | 165445 | +88.20% | ↑Low to High | 8 | 6.49 | 190268 | 6.48 | 359339 | 169071 | +88.86% | ↑Low to High | 9 | 6.86 | 201050 | 6.83 | 378696 | 177646 | +88.36% | ↑Low to High |
|
|
(c) Characterization of malicious deletion attacks on digit frequency (, attack rate = 10%) |
| | | | | | Δ | Δ | Characteristic |
| 0 | 8.44 | 247345 | 8.48 | 223528 | −23817 | −9.63% | ↓High to Low | 1 | 16.28 | 477362 | 16.27 | 429114 | −48248 | −10.11% | ↓High to Low | 2 | 19.88 | 582616 | 19.74 | 520475 | −62141 | −10.67% | ↓High to Low | 3 | 11.37 | 333378 | 11.40 | 300483 | −32895 | −9.87% | ↓High to Low | 4 | 8.83 | 258748 | 8.83 | 232703 | −26045 | −10.07% | ↓High to Low | 5 | 8.31 | 243554 | 8.37 | 220577 | −22977 | −9.43% | ↓High to Low | 6 | 7.14 | 209399 | 7.19 | 189555 | −19844 | −9.48% | ↓High to Low | 7 | 6.40 | 187586 | 6.41 | 168921 | −18665 | −9.95% | ↓High to Low | 8 | 6.49 | 190268 | 6.49 | 171131 | −19137 | −10.06% | ↓High to Low | 9 | 6.86 | 201050 | 6.83 | 180196 | −20854 | −10.37% | ↓High to Low |
|
|
(d) Characterization of malicious deletion attacks on digit frequency (, attack rate = 90%) |
| | | | | | Δ | Δ | Characteristic |
| 0 | 8.44 | 247345 | 8.89 | 25612 | −221733 | −89.65% | ↓High to Low | 1 | 16.28 | 477362 | 18.14 | 52276 | −425086 | −89.05% | ↓High to Low | 2 | 19.88 | 582616 | 19.80 | 57072 | −525544 | −90.20% | ↓High to Low | 3 | 11.37 | 333378 | 11.22 | 32342 | −301036 | −90.30% | ↓High to Low | 4 | 8.83 | 258748 | 8.24 | 23758 | −234990 | −90.82% | ↓High to Low | 5 | 8.31 | 243554 | 7.38 | 21281 | −222273 | −91.26% | ↓High to Low | 6 | 7.14 | 209399 | 6.53 | 18815 | −190584 | −91.01% | ↓High to Low | 7 | 6.40 | 187586 | 6.62 | 19071 | −168515 | −89.83% | ↓High to Low | 8 | 6.49 | 190268 | 6.67 | 19239 | −171029 | −89.89% | ↓High to Low | 9 | 6.86 | 201050 | 6.52 | 18780 | −182270 | −90.66% | ↓High to Low |
|
|
(e) Characterization of malicious update attacks on digit frequency (, attack rate = 10%) |
| | | | | | Δ | Δ | Characteristic |
| 0 | 8.438048 | 247345 | 8.49 | 248357 | 1012 | +0.41% | ↑Low to High | 1 | 16.28496 | 477362 | 16.46 | 481186 | 3824 | +0.80% | ↑Low to High | 2 | 19.87565 | 582616 | 19.81 | 579315 | −3301 | −0.57% | ↓High to Low | 3 | 11.37302 | 333378 | 11.16 | 326311 | −7067 | −2.12% | ↓High to Low | 4 | 8.827055 | 258748 | 8.82 | 258020 | −728 | −0.28% | ↓High to Low | 5 | 8.30872 | 243554 | 8.36 | 244519 | 965 | +0.40% | ↑Low to High | 6 | 7.143539 | 209399 | 7.17 | 209680 | 281 | +0.13% | ↑Low to High | 7 | 6.3994 | 187586 | 6.42 | 187678 | 92 | +0.05% | ↑Low to High | 8 | 6.490895 | 190268 | 6.49 | 189845 | −423 | −0.22% | ↓High to Low | 9 | 6.858718 | 201050 | 6.81 | 199111 | −1939 | −0.96% | ↓High to Low |
|
|
(f) Characterization of malicious update attacks on digit frequency (, attack rate = 90%) |
| | | | | | Δ | Δ | Characteristic |
| 0 | 8.438048 | 247345 | 8.46 | 248462 | 1117 | +0.45% | ↑Low to High | 1 | 16.28496 | 477362 | 18.84 | 553334 | 75972 | +15.91% | ↑Low to High | 2 | 19.87565 | 582616 | 19.10 | 560965 | −21651 | −3.72% | ↓High to Low | 3 | 11.37302 | 333378 | 11.74 | 344665 | 11287 | +3.39% | ↑Low to High | 4 | 8.827055 | 258748 | 8.16 | 239767 | −18981 | −7.34% | ↓High to Low | 5 | 8.30872 | 243554 | 7.35 | 215727 | −27827 | −11.43% | ↓High to Low | 6 | 7.143539 | 209399 | 6.58 | 193116 | −16283 | −7.78% | ↓High to Low | 7 | 6.3994 | 187586 | 6.48 | 190330 | 2744 | +1.46% | ↑Low to High | 8 | 6.490895 | 190268 | 6.62 | 194384 | 4116 | +2.16% | ↑Low to High | 9 | 6.858718 | 201050 | 6.67 | 195785 | −5265 | −2.62% | ↓High to Low |
|
|