论文标题
对联合机器学习的数据中毒攻击
Data Poisoning Attacks on Federated Machine Learning
论文作者
论文摘要
联合机器学习可以使资源约束的节点设备(例如,手机和IoT设备)学习共享模型,同时保持培训数据本地,可以通过设计有效的通信协议来提供隐私,安全和经济利益。但是,攻击者可以利用不同节点之间的通信协议来发射数据中毒攻击,这已被证明是大多数机器学习模型的巨大威胁。在本文中,我们试图探索联合机器学习的脆弱性。更具体地说,我们专注于攻击联合的多任务学习框架,该框架是通过采用一般多任务学习框架来应对统计挑战的联合学习框架。我们制定了计算对联邦多任务学习最佳中毒攻击的问题,作为一个双重计划,该程序适应目标节点的任意选择和源攻击节点。然后,我们提出了一种新颖的系统感知优化方法,对联合学习的攻击(AT2FL),这是有效的效率,可以得出中毒数据的隐式梯度,并进一步计算联合机器学习中的最佳攻击策略。我们的工作是一项较早的研究,该研究考虑了用于联邦学习的数据中毒攻击问题。最后,现实世界数据集的实验结果表明,当攻击者直接毒害目标节点或间接毒化相关节点时,联合的多任务学习模型对中毒攻击非常敏感。
Federated machine learning which enables resource constrained node devices (e.g., mobile phones and IoT devices) to learn a shared model while keeping the training data local, can provide privacy, security and economic benefits by designing an effective communication protocol. However, the communication protocol amongst different nodes could be exploited by attackers to launch data poisoning attacks, which has been demonstrated as a big threat to most machine learning models. In this paper, we attempt to explore the vulnerability of federated machine learning. More specifically, we focus on attacking a federated multi-task learning framework, which is a federated learning framework via adopting a general multi-task learning framework to handle statistical challenges. We formulate the problem of computing optimal poisoning attacks on federated multi-task learning as a bilevel program that is adaptive to arbitrary choice of target nodes and source attacking nodes. Then we propose a novel systems-aware optimization method, ATTack on Federated Learning (AT2FL), which is efficiency to derive the implicit gradients for poisoned data, and further compute optimal attack strategies in the federated machine learning. Our work is an earlier study that considers issues of data poisoning attack for federated learning. To the end, experimental results on real-world datasets show that federated multi-task learning model is very sensitive to poisoning attacks, when the attackers either directly poison the target nodes or indirectly poison the related nodes by exploiting the communication protocol.