【论文阅读笔记】Beyond Traditional Threats A Persistent Backdoor Attack on Federated Learning

文章探讨了在FederatedLearning中,通过提出新的度量和全组合后门攻击,增强后门攻击的持久性。研究者生成组合触发器并设计目标函数,实验证明了这种新型攻击方法在保持后门效果的同时提高了对检测的挑战。
摘要由CSDN通过智能技术生成

个人阅读笔记,如有错误欢迎指出

会议:AAAI 2024 Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning| Proceedings of the AAAI Conference on Artificial Intelligence

问题:

        后门容易被联邦中的良性更新稀释,持久性差

        灾难性遗忘解释了后门稀释

创新:

        提出了一种新的度量来量化被削弱的后门程度

        提出全组合后门攻击,聚合了更多的组合触发信息

方法:

攻击者能力:与DBA设置相同,可以完全控制受害的本地模型修改超参数。触发器使用白色像素块(占图像2%),左上角。

训练过程采用模型替换方法,优化local epoch和学习率以优化后门,以确保后门在平均聚合中幸存

  • image

本文方法:1)生成完整的组合触发器 2)恶意客户端数量计算 3)设计目标函数

  • image

1)生成组合触发器

        给定一个触发器分区数m,全局触发器被划分为m个不同的部分,这些部分被视为单元,通过不同样式的组合来生成局部触发器。(训练阶段本地模型使用组合的trigger,测试阶段使用全局trigger)

  • image

        m需要大于等于2但不能过大,m=1表示集中式攻击,过大的m将导致局部触发器极小影响后门效果增加计算量。

2)恶意客户端数量计算

        每个恶意客户端使用唯一的本地触发器,恶意客户端的总数M与本地触发器的总数相对应

        当式4中的两个变量都为1时,简化为式5,将该式反过来得到组合数的和,可以此确定恶意客户端的数量。(如若触发器被划分为4各区域,即m=4m=4,则共有14个恶意客户端)

  • image

  • image

  • image

3)设计目标函数

        考虑到恶意客户端和本地触发器之间的直接映射,每个本地模型都可以成为唯一的后门攻击目标。因此可将FCBA划分为M个子攻击问题,第t轮第i个攻击者目标标签为\tau的对抗目标如下。函数B将后门样本输出到对应标签\tau

实验:

        使用超参数为0.5的Dirichlet分布将图像分配给100个客户端,每轮选10个客户端提交本地更新。

触发器\phi=\{size,location,gap\}:MNIST \phi=\{4,2,0\},CIFAR & GTSRB\phi=\{6,3,0\}

        后门学习率投毒率如下。采用single-shot攻击,放大恶意更新

        投毒后随着时间后门存活率(后门成功率)以及干净样本准确率

        可视化MNIST “3”干净样本和20个后门样本的数据分布。图5显示随着回合的增多,DBA模糊了后门与干净样本。图6显示在FCBA中,干净样本与后门样本之间有明显的界限

        干净与目标样本分别与其在测试集中的t-SNE距离,与DBA相比FCBA的t-SNE距离更大,表明FCBA区分干净样本和后门样本的能力更强(更高的攻击持久性)

        缩放因子消融

        异质性消融

        裁剪边界防御下的效果

        差分隐私防御下的效果

总结

        排列组合版的DBA,创新相对较弱,但是实验很充分,可以借鉴实验安排。

        已有的研究证明通过放大恶意更新很容易通过比较更新方向检测出来,本文通过\gamma对恶意更新进行了放大,但并未比较在基于过滤的后门防御方法。

  • 11
    点赞
  • 17
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Introduction: The use of sandbox technology has gained widespread popularity in recent years, especially in the field of cybersecurity engineering. Sandboxing is a technique that provides a secure and isolated environment for executing unknown or suspicious programs, files or code, without affecting the host system. This technology is used to test the behavior of malicious software, analyze the source code, and evaluate the potential risks and vulnerabilities. In this thesis, we will explore the application of sandbox technology in cybersecurity engineering, its benefits, limitations, and future prospects. Chapter 1: Overview of Sandbox Technology This chapter will provide an overview of sandbox technology, including its definition, history, and evolution. The chapter will also cover the different types of sandboxing techniques, such as software-based, hardware-based, and hybrid sandboxes. Additionally, the chapter will discuss the benefits of using sandbox technology in cybersecurity engineering, including improved threat detection, faster incident response, and reduced risk of data loss or theft. Chapter 2: Sandbox Technology in Malware Analysis This chapter will focus on the application of sandbox technology in malware analysis. Malware is one of the most significant threats to cybersecurity, and sandbox technology provides an effective way to analyze the behavior of malware in a safe and controlled environment. The chapter will explain the process of analyzing malware using sandbox technology, including the collection of samples, the configuration of the sandbox environment, and the interpretation of the results. The chapter will also discuss the limitations of sandbox technology in malware analysis, such as the inability to detect advanced persistent threats (APTs) and the limitations of static analysis. Chapter 3: Sandbox Technology in Vulnerability Testing This chapter will examine the use of sandbox technology in vulnerability testing. Vulnerability testing is the process of identifying vulnerabilities in a system or application that could be exploited by attackers. Sandboxing provides a secure and controlled environment for testing the impact of vulnerabilities and assessing the effectiveness of remediation efforts. The chapter will discuss the different types of vulnerability testing, such as static analysis, dynamic analysis, and fuzz testing. The chapter will also cover the benefits and limitations of using sandbox technology in vulnerability testing. Chapter 4: Sandbox Technology in Incident Response This chapter will explore the application of sandbox technology in incident response. Incident response is the process of detecting, analyzing, and responding to cybersecurity incidents. Sandboxing provides a fast and efficient way to analyze suspicious files or code and determine if they are malicious. The chapter will explain the process of using sandbox technology in incident response, including sample collection, sandbox configuration, and result interpretation. The chapter will also discuss the benefits and limitations of using sandbox technology in incident response. Chapter 5: Future Prospects of Sandbox Technology in Cybersecurity Engineering This chapter will examine the future prospects of sandbox technology in cybersecurity engineering. Sandboxing is an evolving technology, and its application in cybersecurity engineering is likely to expand in the future. The chapter will discuss the emerging trends and technologies in sandboxing, such as virtualization, cloud-based sandboxes, and containerization. The chapter will also cover the challenges and limitations of sandbox technology, such as the increasing sophistication of malware and the limitations of static analysis. Conclusion: Sandbox technology is a powerful tool for cybersecurity engineering, providing a secure and isolated environment for analyzing suspicious files or code. The technology is widely used in malware analysis, vulnerability testing, and incident response. Although sandbox technology has some limitations, such as the inability to detect advanced persistent threats (APTs), it remains an essential tool in the cybersecurity arsenal. As sandbox technology continues to evolve, its application in cybersecurity engineering is likely to expand, providing new opportunities and challenges for cybersecurity professionals.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值