论文标题
确保联邦学习反对压倒性的合格攻击者
Securing Federated Learning against Overwhelming Collusive Attackers
论文作者
论文摘要
在一个以数据驱动的社会为时代,物联网(IoT)设备的无处不在,存储在不同地方的大量数据,分布式学习已经获得了很多吸引力,但是,假设在设备中具有独立且相同的分布数据(IID)。在放松这种假设的同时,由于设备的异质性质,无论如何都无法实现现实,但Federated Learnation(FL)已成为一种保护隐私的解决方案,可以训练与大量设备分布的非IID数据进行协作模型。但是,由于不受限制的参与,打算破坏FL模型的恶意设备(攻击者)的出现是不可避免的。在这项工作中,我们旨在确定此类攻击者并减轻其对模型的影响,从本质上讲,在双向标签与勾结的翻转攻击的环境下。我们通过利用本地模型之间的相关性来提出两种基于最小生成树和k-densest图的理论算法。即使攻击者最多占所有客户的70%,我们的FL模型也可能无效,而先前的工作负担不超过50%的客户作为攻击者。通过在两个基准数据集上进行实验,即MNIST和时尚 - 持有人,并具有压倒性的攻击者,可以确定我们算法的有效性。我们使用准确性,攻击成功率和早期检测回合建立了算法优于现有算法的优势。
In the era of a data-driven society with the ubiquity of Internet of Things (IoT) devices storing large amounts of data localized at different places, distributed learning has gained a lot of traction, however, assuming independent and identically distributed data (iid) across the devices. While relaxing this assumption that anyway does not hold in reality due to the heterogeneous nature of devices, federated learning (FL) has emerged as a privacy-preserving solution to train a collaborative model over non-iid data distributed across a massive number of devices. However, the appearance of malicious devices (attackers), who intend to corrupt the FL model, is inevitable due to unrestricted participation. In this work, we aim to identify such attackers and mitigate their impact on the model, essentially under a setting of bidirectional label flipping attacks with collusion. We propose two graph theoretic algorithms, based on Minimum Spanning Tree and k-Densest graph, by leveraging correlations between local models. Our FL model can nullify the influence of attackers even when they are up to 70% of all the clients whereas prior works could not afford more than 50% of clients as attackers. The effectiveness of our algorithms is ascertained through experiments on two benchmark datasets, namely MNIST and Fashion-MNIST, with overwhelming attackers. We establish the superiority of our algorithms over the existing ones using accuracy, attack success rate, and early detection round.