A Novel Backdoor Detection Approach Using Entropy-Based Measures

被引:0
作者
Surendrababu, Hema Karnam [1 ,2 ]
Nagaraj, Nithin [3 ]
机构
[1] Univ Transdisciplinary Hlth Sci & Technol, Bengaluru 560012, Karnataka, India
[2] Natl Inst Adv Studies, Indian Inst Sci Campus, Sch Conflict & Secur Studies, Bengaluru 560012, Karnataka, India
[3] Natl Inst Adv Studies, Indian Inst Sci Campus, Sch Humanities, Consciousness Studies Programme, Bengaluru 560012, Karnataka, India
关键词
Entropy; Complexity theory; Training; Data models; Computational modeling; Vectors; Time series analysis; Artificial intelligence; Detection algorithms; Data integrity; Data poisoning; backdoor attacks; backdoor defenses; approximate entropy; sample entropy; TIME-SERIES ANALYSIS; APPROXIMATE ENTROPY; COMPLEXITY; COMPRESSION;
D O I
10.1109/ACCESS.2024.3444273
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Amidst the recent technological breakthroughs and increased integration of Artificial Intelligence (AI) technologies across various domains, it is imperative to consider the myriad security threats posed by AI. One of the significant attack vectors on AI models is the backdoor attack, which involves maliciously manipulating the model's behaviour by inserting hidden patterns or triggers into training datasets. In this paper our primary focus is on the defenses for the backdoor attacks mounted via poisoned training datasets. While many backdoor defense mechanisms have been proposed in the context of text, image, and audio domains, a majority of these defense mechanisms focus on training a specific model to detect backdoor triggers. Our current work proposes a novel model agnostic backdoor detection approach that utilizes complexity/entropy-based measures. In this study, we demonstrate the limitations of currently existing entropy measures - Sample Entropy and Approximate Entropy in detecting backdoor triggers in poisoned datasets. Consequently, we propose a novel modification of the Manhattan metric in the Entropy calculation and incorporate it in the complexity measures. This modified approach is shown to successfully detect backdoor triggers in datasets from not only the Natural Language Processing (NLP) domain, but also from the Financial and Geological domains. The effectiveness of the proposed approach was further substantiated with the high F1 scores in the range of 0.92 to 1.00 across the datasets, and with zero false negatives for the real-world datasets from the Financial and the Geological domains.
引用
收藏
页码:114057 / 114072
页数:16
相关论文
共 46 条
[1]   Detecting opinion spams and fake news using text classification [J].
Ahmed, Hadeer ;
Traore, Issa ;
Saad, Sherif .
SECURITY AND PRIVACY, 2018, 1 (01)
[2]   Facial muscle activity, Response Entropy, and State Entropy indices during noxious stimuli in propofol-nitrous oxide or propofol-nitrous oxide-remifentanil anaesthesia without neuromuscular block [J].
Aho, A. J. ;
Yli-Hankala, A. ;
Lyytikainen, L. -P. ;
Jantti, V. .
BRITISH JOURNAL OF ANAESTHESIA, 2009, 102 (02) :227-233
[3]  
[Anonymous], 2013, P 2013 C EMP METH NA, DOI DOI 10.1371/JOURNAL.PONE.0073791
[4]  
Chen BY, 2018, Arxiv, DOI arXiv:1811.03728
[5]   Mitigating backdoor attacks in LSTM-based text classification systems by Backdoor Keyword Identification [J].
Chen, Chuanshuai ;
Dai, Jiazhu .
NEUROCOMPUTING, 2021, 452 :253-262
[6]  
Chen S., 2022, Findings of the Association for Computational Linguistics: EMNLP, V2022, P668
[7]  
Chen X., 2021, P ICML WORKSH PROSP, P1
[8]  
Chen XY, 2017, Arxiv, DOI arXiv:1712.05526
[9]   Approximate Entropy for all Signals Is the Recommended Threshold Value r Appropriate? [J].
Chon, Ki H. ;
Scully, Christopher G. ;
Lu, Sheng .
IEEE ENGINEERING IN MEDICINE AND BIOLOGY MAGAZINE, 2009, 28 (06) :18-23
[10]   A Backdoor Attack Against LSTM-Based Text Classification Systems [J].
Dai, Jiazhu ;
Chen, Chuanshuai ;
Li, Yufeng .
IEEE ACCESS, 2019, 7 :138872-138878