CoBA: Collusive Backdoor Attacks With Optimized Trigger to Federated Learning

被引:2
作者
Lyu, Xiaoting [1 ]
Han, Yufei [2 ]
Wang, Wei [3 ,4 ]
Liu, Jingkai [1 ]
Wang, Bin [5 ]
Chen, Kai [6 ]
Li, Yidong [1 ]
Liu, Jiqiang [1 ]
Zhang, Xiangliang [7 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Transp, Beijing 100044, Peoples R China
[2] INRIA, F-35042 Rennes, Bretagne, France
[3] Xi An Jiao Tong Univ, Minist Educ Key Lab Intelligent Networks & Network, Xian 710049, Peoples R China
[4] Beijing Jiaotong Univ, Beijing 100044, Peoples R China
[5] Zhejiang Key Lab Artificial Intelligence Things AI, Hangzhou 310053, Peoples R China
[6] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[7] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
基金
北京市自然科学基金;
关键词
Data models; Training; Servers; Computational modeling; Adaptation models; Federated learning; Training data; backdoor attack;
D O I
10.1109/TDSC.2024.3445637
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Considerable efforts have been devoted to addressing distributed backdoor attacks in federated learning (FL) systems. While significant progress has been made in enhancing the security of FL systems, our study reveals that there remains a false sense of security surrounding FL. We demonstrate that colluding malicious participants can effectively execute backdoor attacks during the FL training process, exhibiting high sparsity and stealthiness, which means they can evade common defense methods with only a few attack iterations. Our research highlights this vulnerability by proposing a Collusive Backdoor Attack named CoBA. CoBA is designed to enhance the sparsity and stealthiness of backdoor attacks by offering trigger tuning to facilitate learning of backdoor training data, controlling the bias of malicious local model updates, and applying the projected gradient descent technique. By conducting extensive empirical studies on 5 benchmark datasets, we make the following observations: 1) CoBA successfully circumvents 15 state-of-the-art defense methods for robust FL; 2) Compared to existing backdoor attacks, CoBA consistently achieves superior attack performance; and 3) CoBA can achieve persistent poisoning effects through significantly sparse attack iterations. These findings raise substantial concerns regarding the integrity of FL and underscore the urgent need for heightened vigilance in defending against such attacks.
引用
收藏
页码:1506 / 1518
页数:13
相关论文
共 36 条
[1]   BaFFLe: Backdoor Detection via Feedback -based Federated Learning [J].
Andreina, Sebastien ;
Marson, Giorgia Azzurra ;
Moellering, Helen ;
Karame, Ghassan .
2021 IEEE 41ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2021), 2021, :852-863
[2]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[3]  
Baruch M, 2019, ADV NEUR IN, V32
[4]  
Blanchard P, 2017, ADV NEUR IN, V30
[5]  
Campello Ricardo J. G. B., 2013, Advances in Knowledge Discovery and Data Mining. 17th Pacific-Asia Conference (PAKDD 2013). Proceedings, P160, DOI 10.1007/978-3-642-37456-2_14
[6]   FLCert: Provably Secure Federated Learning Against Poisoning Attacks [J].
Cao, Xiaoyu ;
Zhang, Zaixi ;
Jia, Jinyuan ;
Gong, Neil Zhenqiang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :3691-3705
[7]   FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping [J].
Cao, Xiaoyu ;
Fang, Minghong ;
Liu, Jia ;
Gong, Neil Zhenqiang .
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
[8]  
Cao XY, 2021, AAAI CONF ARTIF INTE, V35, P6885
[9]  
Chen P.-Y., 2020, P ICLR
[10]  
Cohen J, 2019, PR MACH LEARN RES, V97