Multi-Model based Federated Learning Against Model Poisoning Attack: A Deep Learning Based Model Selection for MEC Systems

Read original: arXiv:2409.08237 - Published 9/14/2024 by Somayeh Kianpisheh, Chafika Benzaid, Tarik Taleb
Total Score

0

Multi-Model based Federated Learning Against Model Poisoning Attack: A Deep Learning Based Model Selection for MEC Systems

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper proposes a multi-model based federated learning approach to defend against model poisoning attacks in mobile edge computing (MEC) systems.
  • The approach uses a deep learning-based model selection mechanism to identify and mitigate the impact of malicious models.
  • Experiments show the proposed method can effectively detect and exclude malicious models, improving the resilience of federated learning against model poisoning attacks.

Plain English Explanation

In federated learning, multiple devices (e.g. smartphones, IoT sensors) collaboratively train a shared machine learning model without sharing their raw data. This helps protect user privacy while still leveraging distributed data to train powerful models.

However, federated learning is vulnerable to model poisoning attacks, where malicious devices upload corrupted models to sabotage the shared model. This paper proposes a solution to defend against such attacks in mobile edge computing (MEC) systems.

The key idea is to use multiple models instead of a single shared model. Each device trains its own local model, and a central server selects the best models to include in the global model. A deep learning-based model selection mechanism is used to identify and exclude malicious models, improving the resilience of the federated learning system.

By maintaining and aggregating multiple models, rather than relying on a single shared model, the approach can withstand attempts to "poison" the model and improve the overall security and performance of the federated learning system.

Technical Explanation

The paper presents a multi-model based federated learning framework to defend against model poisoning attacks in MEC systems. The key components are:

  1. Local Model Training: Each device trains its own local model using its private data.
  2. Model Selection: A central server receives the local models and uses a deep learning-based model selection mechanism to identify and exclude malicious models.
  3. Global Model Aggregation: The central server aggregates the selected local models to form the global federated learning model.

The model selection mechanism uses a deep neural network to evaluate the quality and trustworthiness of each local model. It considers factors like model performance, parameter distribution, and gradient information to detect anomalies indicative of malicious models.

Experiments on benchmark datasets show the proposed multi-model approach can effectively mitigate the impact of model poisoning attacks, improving the resilience and stability of the federated learning system compared to using a single shared model.

Critical Analysis

The paper provides a valuable contribution to defending federated learning systems against model poisoning attacks. The multi-model approach and deep learning-based model selection mechanism offer a promising solution to this important security challenge.

However, the paper does not address some potential limitations and areas for further research:

  • Computational Overhead: Maintaining and evaluating multiple local models may introduce significant computational and communication overhead, especially for resource-constrained edge devices. The scalability of the approach in large-scale federated learning systems should be further investigated.

  • Attack Sophistication: The paper focuses on basic model poisoning attacks, but more advanced and adaptive attack strategies may be able to bypass the proposed defense mechanism. Exploring more sophisticated attack scenarios and developing countermeasures would be an important next step.

  • Fairness and Incentives: The model selection process may introduce unfairness if certain devices are consistently excluded from the global model. Developing mechanisms to ensure fair and equitable participation in federated learning would be crucial for real-world deployment.

Overall, the paper presents a promising approach to improving the security of federated learning, but further research is needed to address these potential limitations and expand the resilience of the system against more sophisticated attacks.

Conclusion

This paper tackles the critical challenge of defending federated learning systems against model poisoning attacks, which can severely undermine the performance and reliability of the shared model. By proposing a multi-model based approach with a deep learning-based model selection mechanism, the authors demonstrate an effective way to identify and exclude malicious models, enhancing the overall resilience of the federated learning system.

The insights and techniques presented in this work have significant implications for the deployment of federated learning in real-world mobile edge computing applications, where the protection of user privacy and the integrity of the learned models are crucial. As the field of federated learning continues to evolve, addressing security threats like model poisoning will be essential for enabling the widespread adoption and trust in this powerful distributed learning paradigm.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

Multi-Model based Federated Learning Against Model Poisoning Attack: A Deep Learning Based Model Selection for MEC Systems
Total Score

0

Multi-Model based Federated Learning Against Model Poisoning Attack: A Deep Learning Based Model Selection for MEC Systems

Somayeh Kianpisheh, Chafika Benzaid, Tarik Taleb

Federated Learning (FL) enables training of a global model from distributed data, while preserving data privacy. However, the singular-model based operation of FL is open with uploading poisoned models compatible with the global model structure and can be exploited as a vulnerability to conduct model poisoning attacks. This paper proposes a multi-model based FL as a proactive mechanism to enhance the opportunity of model poisoning attack mitigation. A master model is trained by a set of slave models. To enhance the opportunity of attack mitigation, the structure of client models dynamically change within learning epochs, and the supporter FL protocol is provided. For a MEC system, the model selection problem is modeled as an optimization to minimize loss and recognition time, while meeting a robustness confidence. In adaption with dynamic network condition, a deep reinforcement learning based model selection is proposed. For a DDoS attack detection scenario, results illustrate a competitive accuracy gain under poisoning attack with the scenario that the system is without attack, and also a potential of recognition time improvement.

Read more

9/14/2024

🔎

Total Score

0

Mitigating Malicious Attacks in Federated Learning via Confidence-aware Defense

Qilei Li, Ahmed M. Abdelmoniem

Federated Learning (FL) is a distributed machine learning diagram that enables multiple clients to collaboratively train a global model without sharing their private local data. However, FL systems are vulnerable to attacks that are happening in malicious clients through data poisoning and model poisoning, which can deteriorate the performance of aggregated global model. Existing defense methods typically focus on mitigating specific types of poisoning and are often ineffective against unseen types of attack. These methods also assume an attack happened moderately while is not always holds true in real. Consequently, these methods can significantly fail in terms of accuracy and robustness when detecting and addressing updates from attacked malicious clients. To overcome these challenges, in this work, we propose a simple yet effective framework to detect malicious clients, namely Confidence-Aware Defense (CAD), that utilizes the confidence scores of local models as criteria to evaluate the reliability of local updates. Our key insight is that malicious attacks, regardless of attack type, will cause the model to deviate from its previous state, thus leading to increased uncertainty when making predictions. Therefore, CAD is comprehensively effective for both model poisoning and data poisoning attacks by accurately identifying and mitigating potential malicious updates, even under varying degrees of attacks and data heterogeneity. Experimental results demonstrate that our method significantly enhances the robustness of FL systems against various types of attacks across various scenarios by achieving higher model accuracy and stability.

Read more

8/20/2024

Resilience in Online Federated Learning: Mitigating Model-Poisoning Attacks via Partial Sharing
Total Score

0

Resilience in Online Federated Learning: Mitigating Model-Poisoning Attacks via Partial Sharing

Ehsan Lari, Reza Arablouei, Vinay Chakravarthi Gogineni, Stefan Werner

Federated learning (FL) allows training machine learning models on distributed data without compromising privacy. However, FL is vulnerable to model-poisoning attacks where malicious clients tamper with their local models to manipulate the global model. In this work, we investigate the resilience of the partial-sharing online FL (PSO-Fed) algorithm against such attacks. PSO-Fed reduces communication overhead by allowing clients to share only a fraction of their model updates with the server. We demonstrate that this partial sharing mechanism has the added advantage of enhancing PSO-Fed's robustness to model-poisoning attacks. Through theoretical analysis, we show that PSO-Fed maintains convergence even under Byzantine attacks, where malicious clients inject noise into their updates. Furthermore, we derive a formula for PSO-Fed's mean square error, considering factors like stepsize, attack probability, and the number of malicious clients. Interestingly, we find a non-trivial optimal stepsize that maximizes PSO-Fed's resistance to these attacks. Extensive numerical experiments confirm our theoretical findings and showcase PSO-Fed's superior performance against model-poisoning attacks compared to other leading FL algorithms.

Read more

8/19/2024

Poisoning with A Pill: Circumventing Detection in Federated Learning
Total Score

0

Poisoning with A Pill: Circumventing Detection in Federated Learning

Hanxi Guo, Hao Wang, Tao Song, Tianhang Zheng, Yang Hua, Haibing Guan, Xiangyu Zhang

Without direct access to the client's data, federated learning (FL) is well-known for its unique strength in data privacy protection among existing distributed machine learning techniques. However, its distributive and iterative nature makes FL inherently vulnerable to various poisoning attacks. To counteract these threats, extensive defenses have been proposed to filter out malicious clients, using various detection metrics. Based on our analysis of existing attacks and defenses, we find that there is a lack of attention to model redundancy. In neural networks, various model parameters contribute differently to the model's performance. However, existing attacks in FL manipulate all the model update parameters with the same strategy, making them easily detectable by common defenses. Meanwhile, the defenses also tend to analyze the overall statistical features of the entire model updates, leaving room for sophisticated attacks. Based on these observations, this paper proposes a generic and attack-agnostic augmentation approach designed to enhance the effectiveness and stealthiness of existing FL poisoning attacks against detection in FL, pointing out the inherent flaws of existing defenses and exposing the necessity of fine-grained FL security. Specifically, we employ a three-stage methodology that strategically constructs, generates, and injects poison (generated by existing attacks) into a pill (a tiny subnet with a novel structure) during the FL training, named as pill construction, pill poisoning, and pill injection accordingly. Extensive experimental results show that FL poisoning attacks enhanced by our method can bypass all the popular defenses, and can gain an up to 7x error rate increase, as well as on average a more than 2x error rate increase on both IID and non-IID data, in both cross-silo and cross-device FL systems.

Read more

7/23/2024