Identifying alternately poisoning attacks in federated learning online using trajectory anomaly detection method

被引:2
作者
Ding, Zhiying [1 ]
Wang, Wenshuo [1 ]
Li, Xu [1 ]
Wang, Xuan [1 ]
Jeon, Gwanggil [2 ]
Zhao, Jindong [1 ]
Mu, Chunxiao [1 ]
机构
[1] Yantai Univ, Sch Comp & Control Engn, Yantai 264005, Peoples R China
[2] Incheon Natl Univ, Dept Embedded Syst Engn, Incheon 22012, South Korea
来源
SCIENTIFIC REPORTS | 2024年 / 14卷 / 01期
关键词
Federated learning; Edge device client; IoT; Poisoning detection; Trajectory detection;
D O I
10.1038/s41598-024-70375-w
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Implicit poisoning in federated learning is a significant threat, with malicious nodes subtly altering gradient parameters each round, making detection difficult. This study investigates this problem, revealing that temporal analysis alone struggles to identify such covert attacks, which can bypass online methods like cosine similarity and clustering. Common detection methods rely on offline analysis, resulting in delayed responses. However, recalculating gradient updates reveals distinct characteristics of malicious clients. Based on this finding, we designed a privacy-preserving detection algorithm using trajectory anomaly detection. Singular values of matrices are used as features, and an improved Isolation Forest algorithm processes these to detect malicious behavior. Experiments on MNIST, FashionMNIST, and CIFAR-10 datasets show our method achieves 94.3% detection accuracy and a false positive rate below 1.2%, indicating its high accuracy and effectiveness in detecting implicit model poisoning attacks.
引用
收藏
页数:11
相关论文
共 34 条
[1]   IoT transaction processing through cooperative concurrency control on fog-cloud computing environment [J].
Al-Qerem, Ahmad ;
Alauthman, Mohammad ;
Almomani, Ammar ;
Gupta, B. B. .
SOFT COMPUTING, 2020, 24 (08) :5695-5711
[2]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[3]  
Bhagoji AN, 2019, PR MACH LEARN RES, V97
[4]  
Blanchard P, 2017, ADV NEUR IN, V30
[5]   iBOAT: Isolation-Based Online Anomalous Trajectory Detection [J].
Chen, Chao ;
Zhang, Daqing ;
Castro, Pablo Samuel ;
Li, Nan ;
Sun, Lin ;
Li, Shijian ;
Wang, Zonghui .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2013, 14 (02) :806-818
[6]   FedHealth: A Federated Transfer Learning Framework for Wearable Healthcare [J].
Chen, Yiqiang ;
Qin, Xin ;
Wang, Jindong ;
Yu, Chaohui ;
Gao, Wen .
IEEE INTELLIGENT SYSTEMS, 2020, 35 (04) :83-93
[7]   A training-integrity privacy-preserving federated learning scheme with trusted execution environment [J].
Chen, Yu ;
Luo, Fang ;
Li, Tong ;
Xiang, Tao ;
Liu, Zheli ;
Li, Jin .
INFORMATION SCIENCES, 2020, 522 :69-79
[8]  
Damaskinos G., 2019, P MACHINE LEARNING S, V1, P81
[9]  
Fang MH, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1623
[10]   Privacy and Security in Federated Learning: A Survey [J].
Gosselin, Remi ;
Vieu, Loic ;
Loukil, Faiza ;
Benoit, Alexandre .
APPLIED SCIENCES-BASEL, 2022, 12 (19)