Protecting machine learning from poisoning attacks: A risk-based approach

被引:0
作者
Bena, Nicola [1 ,2 ]
Anisetti, Marco [1 ]
Damiani, Ernesto [1 ,2 ]
Yeun, Chan Yeob [1 ,2 ]
Ardagna, Claudio A. [1 ,2 ]
机构
[1] Univ Milan, Dept Comp Sci, Via Celoria 18, I-20133 Milan, Italy
[2] Khalifa Univ, Comp Sci Dept, C2PS, POB 127788, Abu Dhabi, U Arab Emirates
关键词
Ensemble; Machine learning; Poisoning; Risk; Robustness;
D O I
10.1016/j.cose.2025.104468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ever-increasing interest in and widespread diffusion of Machine Learning (ML)-based applications has driven a substantial amount of research into offensive and defensive ML. ML models can be attacked from different angles: poisoning attacks, the focus of this paper, inject maliciously crafted data points in the training set to modify the model behavior; adversarial attacks maliciously manipulate inference-time data points to fool the ML model and drive the prediction of the ML model according to the attacker's objective. Ensemble-based techniques are among the most relevant defenses against poisoning attacks and replace the monolithic ML model with an ensemble of ML models trained on different (disjoint) subsets of the training set. They assign data points to the training sets of the models in the ensemble (routing) randomly or using a hash function, assuming that evenly distributing poisoned data points positively influences ML robustness. Our paper departs from this assumption and implements a risk-based ensemble technique where a risk management process is used to perform a smart routing of data points to the training sets. An extensive experimental evaluation demonstrates the effectiveness of the proposed approach in terms of its soundness, robustness, and performance.
引用
收藏
页数:13
相关论文
共 61 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]   On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach [J].
Anisetti, Marco ;
Ardagna, Claudio A. ;
Balestrucci, Alessandro ;
Bena, Nicola ;
Damiani, Ernesto ;
Yeun, Chan Yeob .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2023, 8 (04) :540-554
[3]   Rethinking Certification for Trustworthy Machine-Learning-Based Applications [J].
Anisetti, Marco ;
Ardagna, Claudio A. ;
Bena, Nicola ;
Damiani, Ernesto .
IEEE INTERNET COMPUTING, 2023, 27 (06) :22-28
[4]  
Aryal K., 2023, arXiv
[5]  
Aryal K., 2022, P IEEE BIG DATA 2022
[6]   Evaluating password strength based on information spread on social networks: A combined approach relying on data reconstruction and generative models [J].
Atzori, Maurizio ;
Calo, Eleonora ;
Caruccio, Loredana ;
Cirillo, Stefano ;
Polese, Giuseppe ;
Solimando, Giandomenico .
ONLINE SOCIAL NETWORKS AND MEDIA, 2024, 42
[7]  
Bansal H., 2023, P IEEE CVF ICCV 2023
[8]  
Bellandi V., 2024, ACM Transactions on Internet Technology
[9]  
Bena N., 2024, SN Comput. Sci., V5
[10]  
Biggio B., 2012, P ICML 2012