Poisoning Attacks on Federated Learning for Autonomous Driving

Read original: arXiv:2405.01073 - Published 5/3/2024 by Sonakshi Garg, Hugo Jonsson, Gustav Kalander, Axel Nilsson, Bhhaanu Pirange, Viktor Valadi, Johan Ostman
Total Score

0

🔎

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • Federated Learning (FL) is a decentralized machine learning approach that allows multiple parties to train models collaboratively while keeping their data private.
  • FL has potential benefits for autonomous driving, such as reducing data storage costs and accelerating model training.
  • However, FL is vulnerable to poisoning attacks, where malicious participants can manipulate the training process to degrade the final model's performance.

Plain English Explanation

Federated Learning (FL) is a way for different organizations or devices to work together to train a machine learning model without having to share their private data. This could be useful for autonomous driving, where car companies or self-driving car developers could collaborate to create better models without each having to share all of their driving data.

The paper introduces two new types of poisoning attacks that can target FL systems used for autonomous driving tasks like vehicle trajectory prediction. FLStealth is an attack that tries to slowly degrade the overall model performance in a stealthy way, while Off-Track Attack (OTA) is a targeted attack that aims to change the model's behavior when it encounters a specific trigger.

The researchers show that these attacks can be effective at bypassing defenses that the FL system might have in place. This highlights the need for new defensive mechanisms to protect FL systems, especially for safety-critical applications like self-driving cars, from these types of targeted attacks.

Technical Explanation

The paper proposes two new poisoning attacks tailored to regression tasks in autonomous driving using Federated Learning (FL):

  1. FLStealth: An untargeted attack that aims to deteriorate the global model's performance while appearing benign. The attack gradually introduces small perturbations to the model updates provided by malicious participants.

  2. Off-Track Attack (OTA): A targeted attack with the goal of changing the global model's behavior when exposed to a certain trigger. The attack crafts model updates that push the global model towards a desired, malicious behavior.

The researchers demonstrate the effectiveness of these attacks through comprehensive experiments on the task of vehicle trajectory prediction. They show that FLStealth is the most successful at bypassing common defenses employed by the FL server, compared to other untargeted attacks.

For the OTA attack, the paper highlights the inability of existing defense strategies to mitigate the attack, emphasizing the critical need for new defensive mechanisms against targeted attacks in FL for autonomous driving.

Critical Analysis

The paper provides valuable insights into the vulnerabilities of Federated Learning (FL) systems, particularly in the context of autonomous driving applications. The proposed attacks, FLStealth and Off-Track Attack (OTA), demonstrate the potential for malicious actors to exploit FL and degrade the performance or behavior of the trained models.

One potential limitation of the research is the specific focus on regression tasks in autonomous driving. It would be interesting to see if these attacks, or similar ones, could be generalized to other types of machine learning tasks and applications that utilize FL.

Additionally, the paper does not explore the effectiveness of these attacks in a more realistic, large-scale FL setting with a diverse set of participants. Further research is needed to understand how these attacks would scale and the potential impact on real-world FL deployments.

While the paper highlights the need for new defensive mechanisms, it would be valuable to see more in-depth discussion on potential countermeasures and their feasibility. Exploring techniques like robust aggregation methods or anomaly detection could provide valuable insights for securing FL systems against these types of attacks.

Conclusion

This paper introduces two novel poisoning attacks, FLStealth and Off-Track Attack (OTA), that target Federated Learning (FL) systems used for autonomous driving tasks. The research demonstrates the vulnerability of FL to malicious participants who can degrade the performance or manipulate the behavior of the trained models.

The findings highlight the critical need for robust defensive mechanisms to protect FL systems, especially in safety-critical applications like self-driving cars. As the use of FL continues to grow, it will be essential for researchers and practitioners to develop effective countermeasures to ensure the security and reliability of these decentralized machine learning systems.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🔎

Total Score

0

Poisoning Attacks on Federated Learning for Autonomous Driving

Sonakshi Garg, Hugo Jonsson, Gustav Kalander, Axel Nilsson, Bhhaanu Pirange, Viktor Valadi, Johan Ostman

Federated Learning (FL) is a decentralized learning paradigm, enabling parties to collaboratively train models while keeping their data confidential. Within autonomous driving, it brings the potential of reducing data storage costs, reducing bandwidth requirements, and to accelerate the learning. FL is, however, susceptible to poisoning attacks. In this paper, we introduce two novel poisoning attacks on FL tailored to regression tasks within autonomous driving: FLStealth and Off-Track Attack (OTA). FLStealth, an untargeted attack, aims at providing model updates that deteriorate the global model performance while appearing benign. OTA, on the other hand, is a targeted attack with the objective to change the global model's behavior when exposed to a certain trigger. We demonstrate the effectiveness of our attacks by conducting comprehensive experiments pertaining to the task of vehicle trajectory prediction. In particular, we show that, among five different untargeted attacks, FLStealth is the most successful at bypassing the considered defenses employed by the server. For OTA, we demonstrate the inability of common defense strategies to mitigate the attack, highlighting the critical need for new defensive mechanisms against targeted attacks within FL for autonomous driving.

Read more

5/3/2024

Poisoning with A Pill: Circumventing Detection in Federated Learning
Total Score

0

Poisoning with A Pill: Circumventing Detection in Federated Learning

Hanxi Guo, Hao Wang, Tao Song, Tianhang Zheng, Yang Hua, Haibing Guan, Xiangyu Zhang

Without direct access to the client's data, federated learning (FL) is well-known for its unique strength in data privacy protection among existing distributed machine learning techniques. However, its distributive and iterative nature makes FL inherently vulnerable to various poisoning attacks. To counteract these threats, extensive defenses have been proposed to filter out malicious clients, using various detection metrics. Based on our analysis of existing attacks and defenses, we find that there is a lack of attention to model redundancy. In neural networks, various model parameters contribute differently to the model's performance. However, existing attacks in FL manipulate all the model update parameters with the same strategy, making them easily detectable by common defenses. Meanwhile, the defenses also tend to analyze the overall statistical features of the entire model updates, leaving room for sophisticated attacks. Based on these observations, this paper proposes a generic and attack-agnostic augmentation approach designed to enhance the effectiveness and stealthiness of existing FL poisoning attacks against detection in FL, pointing out the inherent flaws of existing defenses and exposing the necessity of fine-grained FL security. Specifically, we employ a three-stage methodology that strategically constructs, generates, and injects poison (generated by existing attacks) into a pill (a tiny subnet with a novel structure) during the FL training, named as pill construction, pill poisoning, and pill injection accordingly. Extensive experimental results show that FL poisoning attacks enhanced by our method can bypass all the popular defenses, and can gain an up to 7x error rate increase, as well as on average a more than 2x error rate increase on both IID and non-IID data, in both cross-silo and cross-device FL systems.

Read more

7/23/2024

Tracing Back the Malicious Clients in Poisoning Attacks to Federated Learning
Total Score

0

Tracing Back the Malicious Clients in Poisoning Attacks to Federated Learning

Yuqi Jia, Minghong Fang, Hongbin Liu, Jinghuai Zhang, Neil Zhenqiang Gong

Poisoning attacks compromise the training phase of federated learning (FL) such that the learned global model misclassifies attacker-chosen inputs called target inputs. Existing defenses mainly focus on protecting the training phase of FL such that the learnt global model is poison free. However, these defenses often achieve limited effectiveness when the clients' local training data is highly non-iid or the number of malicious clients is large, as confirmed in our experiments. In this work, we propose FLForensics, the first poison-forensics method for FL. FLForensics complements existing training-phase defenses. In particular, when training-phase defenses fail and a poisoned global model is deployed, FLForensics aims to trace back the malicious clients that performed the poisoning attack after a misclassified target input is identified. We theoretically show that FLForensics can accurately distinguish between benign and malicious clients under a formal definition of poisoning attack. Moreover, we empirically show the effectiveness of FLForensics at tracing back both existing and adaptive poisoning attacks on five benchmark datasets.

Read more

7/11/2024

A GAN-Based Data Poisoning Attack Against Federated Learning Systems and Its Countermeasure
Total Score

0

A GAN-Based Data Poisoning Attack Against Federated Learning Systems and Its Countermeasure

Wei Sun, Bo Gao, Ke Xiong, Yuwei Wang

As a distributed machine learning paradigm, federated learning (FL) is collaboratively carried out on privately owned datasets but without direct data access. Although the original intention is to allay data privacy concerns, available but not visible data in FL potentially brings new security threats, particularly poisoning attacks that target such not visible local data. Initial attempts have been made to conduct data poisoning attacks against FL systems, but cannot be fully successful due to their high chance of causing statistical anomalies. To unleash the potential for truly invisible attacks and build a more deterrent threat model, in this paper, a new data poisoning attack model named VagueGAN is proposed, which can generate seemingly legitimate but noisy poisoned data by untraditionally taking advantage of generative adversarial network (GAN) variants. Capable of manipulating the quality of poisoned data on demand, VagueGAN enables to trade-off attack effectiveness and stealthiness. Furthermore, a cost-effective countermeasure named Model Consistency-Based Defense (MCD) is proposed to identify GAN-poisoned data or models after finding out the consistency of GAN outputs. Extensive experiments on multiple datasets indicate that our attack method is generally much more stealthy as well as more effective in degrading FL performance with low complexity. Our defense method is also shown to be more competent in identifying GAN-poisoned data or models. The source codes are publicly available at href{https://github.com/SSssWEIssSS/VagueGAN-Data-Poisoning-Attack-and-Its-Countermeasure}{https://github.com/SSssWEIssSS/VagueGAN-Data-Poisoning-Attack-and-Its-Countermeasure}.

Read more

5/22/2024