Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach

被引:8
作者
Li, Kai [1 ,2 ]
Zheng, Jingjing [3 ,4 ]
Yuan, Xin [5 ]
Ni, Wei [5 ]
Akan, Ozgur B. [6 ,7 ]
Poor, H. Vincent [8 ]
机构
[1] Univ Cambridge, Dept Engn, Cambridge CB3 0FA, England
[2] Real Time & Embedded Comp Syst Res Ctr CISTER, P-4249015 Porto, Portugal
[3] Carnegie Mellon Univ, CyLab Secur & Privacy Inst, Pittsburgh, PA 15213 USA
[4] Real Time & Embedded Comp Syst Res Ctr CISTER, P-4249015 Porto, Portugal
[5] Commonwealth Sci & Ind Res Org CSIRO, Digital Prod & Serv Flagship, Sydney, NSW 2122, Australia
[6] Univ Cambridge, Dept Engn, Div Elect Engn, Cambridge CB3 0FA, England
[7] Koc Univ, Ctr neXt generat Commun CXC, TR-34450 Istanbul, Turkiye
[8] Princeton Univ, Dept Elect & Comp Engn, Princeton, NJ 08544 USA
关键词
Federated learning; model poisoning attack; graph autoencoder; feature correlation; ATTACKS; IOT;
D O I
10.1109/TIFS.2024.3362147
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a novel, data-agnostic, model poisoning attack on Federated Learning (FL), by designing a new adversarial graph autoencoder (GAE)-based framework. The attack requires no knowledge of FL training data and achieves both effectiveness and undetectability. By listening to the benign local models and the global model, the attacker extracts the graph structural correlations among the benign local models and the training data features substantiating the models. The attacker then adversarially regenerates the graph structural correlations while maximizing the FL training loss, and subsequently generates malicious local models using the adversarial graph structure and the training data features of the benign ones. A new algorithm is designed to iteratively train the malicious local models using GAE and sub-gradient descent. The convergence of FL under attack is rigorously proved, with a considerably large optimality gap. Experiments show that the FL accuracy drops gradually under the proposed attack and existing defense mechanisms fail to detect it. The attack can give rise to an infection across all benign devices, making it a serious threat to FL.
引用
收藏
页码:3465 / 3480
页数:16
相关论文
共 62 条
[1]   Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Khormali, Aminollah ;
Alasmary, Hisham ;
Park, Jeman ;
Anwar, Afsah ;
Mohaisen, Aziz .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :1296-1305
[2]  
[Anonymous], 2012, IEEE Signal Process. Mag., DOI DOI 10.1109/MSP.2012.2211477
[3]  
Aviram N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P689
[4]   Threat of Adversarial Attacks on DL-Based IoT Device Identification [J].
Bao, Zhida ;
Lin, Yun ;
Zhang, Sicheng ;
Li, Zixin ;
Mao, Shiwen .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :9012-9024
[5]  
Blanchard P, 2017, ADV NEUR IN, V30
[6]  
Boyd S., 2004, Convex Optimization
[7]   A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications [J].
Cai, HongYun ;
Zheng, Vincent W. ;
Chang, Kevin Chen-Chuan .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2018, 30 (09) :1616-1637
[8]   Cluster-driven Graph Federated Learning over Multiple Domains [J].
Caldarola, Debora ;
Mancini, Massimiliano ;
Galasso, Fabio ;
Ciccone, Marco ;
Rodola, Emanuele ;
Caputo, Barbara .
2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2021, 2021, :2743-2752
[9]   Understanding Distributed Poisoning Attack in Federated Learning [J].
Cao, Di ;
Chang, Shan ;
Lin, Zhijian ;
Liu, Guohua ;
Sunt, Donghong .
2019 IEEE 25TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2019, :233-239
[10]   MPAF: Model Poisoning Attacks to Federated Learning based on Fake Clients [J].
Cao, Xiaoyu ;
Gong, Neil Zhenqiang .
2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2022, 2022, :3395-3403