Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models

被引:34
作者
Gong, Xueluan [1 ]
Wang, Qian [2 ]
Chen, Yanjiao [3 ]
Yang, Wang [4 ]
Jiang, Xinchang [1 ]
机构
[1] Wuhan Univ, Comp Sci, Wuhan, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
[3] Wuhan Univ, Wuhan, Peoples R China
[4] Wuhan Univ, Cyber Sci & Engn, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Computational modeling; Training data; Machine learning; Speech recognition; Propulsion; Internet; Security;
D O I
10.1109/MCOM.001.2000196
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Machine learning models have achieved state-of-the-art performance in various fields, from image classification to speech recognition. However, such models are trained with a large amount of sensitive training data, and are typically computationally expensive to build. As a result, many cloud providers (e.g., Google) have launched machine-learning-as-a-service, which helps clients benefit from the sophisticated cloud-based machine learning models via accessing public APIs. Such a business paradigm significantly expedites and simplifies the development circles. Unfortunately, the commercial value of such cloud-based machine learning models motivates attackers to conduct model extraction attacks for free use or as a springboard to conduct other attacks (e.g., craft adversarial examples in black-box settings). In this article, we conduct a thorough investigation of existing approaches to model extraction attacks and defenses on cloud-based models. We classify the state-of-the-art attack schemes into two categories based on whether the attacker aims to steal the property (i.e., parameters, hyperparameters, and architecture) or the functionality of the model. We also categorize defending schemes into two groups based on whether the scheme relies on output disturbance or query observation. We not only present a detailed survey of each method, but also demonstrate the comparison of both attack and defense approaches via experiments. We highlight several future directions in both model extraction attacks and its defenses, which shed light on possible avenues for further studies.
引用
收藏
页码:83 / 89
页数:7
相关论文
共 50 条
  • [21] A Weighted Machine Learning-Based Attacks Classification to Alleviating Class Imbalance
    Chkirbene, Zina
    Erbad, Aiman
    Hamila, Ridha
    Gouissem, Ala
    Mohamed, Amr
    Guizani, Mohsen
    Hamdi, Mounir
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 4780 - 4791
  • [22] Model Agnostic Defence Against Backdoor Attacks in Machine Learning
    Udeshi, Sakshi
    Peng, Shanshan
    Woo, Gerald
    Loh, Lionell
    Rawshan, Louth
    Chattopadhyay, Sudipta
    IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (02) : 880 - 895
  • [23] Countering Statistical Attacks in Cloud-Based Searchable Encryption
    M. A. Manazir Ahsan
    Ihsan Ali
    Mohd Yamani Idna Bin Idris
    Muhammad Imran
    Muhammad Shoaib
    International Journal of Parallel Programming, 2020, 48 : 470 - 495
  • [24] A filter-based machine learning classification framework for cloud-based medical databases
    Sri, V. Devi Satya
    Vemuru, Srikanth
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 40 (1-3) : 94 - 105
  • [25] Cloud-based email phishing attack using machine and deep learning algorithm
    Umer Ahmed Butt
    Rashid Amin
    Hamza Aldabbas
    Senthilkumar Mohan
    Bader Alouffi
    Ali Ahmadian
    Complex & Intelligent Systems, 2023, 9 : 3043 - 3070
  • [26] Balance Deficits due to Cerebellar Ataxia: A Machine Learning and Cloud-Based Approach
    Ngo, Thang
    Pathirana, Pubudu N.
    Horne, Malcolm K.
    Power, Laura
    Szmulewicz, David J.
    Milne, Sarah C.
    Corben, Louise A.
    Roberts, Melissa
    Delatycki, Martin B.
    IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 2021, 68 (05) : 1507 - 1517
  • [27] Cloud-based email phishing attack using machine and deep learning algorithm
    Butt, Umer Ahmed
    Amin, Rashid
    Aldabbas, Hamza
    Mohan, Senthilkumar
    Alouffi, Bader
    Ahmadian, Ali
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (03) : 3043 - 3070
  • [28] Cloud-Based Machine Learning for Predictive Analytics: Tool Wear Prediction in Milling
    Wu, Dazhong
    Jennings, Connor
    Terpenny, Janis
    Kumara, Soundar
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 2062 - 2069
  • [29] HoneyTwin: Securing smart cities with machine learning-enabled SDN edge and cloud-based honeypots
    Alani, Mohammed M.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 188
  • [30] A Cloud-Based Optimized Ensemble Model for Risk Prediction of Diabetic Progression-An Azure Machine Learning Perspective
    Daliya, V. K.
    Ramesh, T. K.
    IEEE ACCESS, 2025, 13 : 11560 - 11575