A Survey of Attack and Defense Techniques for Federated Learning Systems; [联邦学习系统攻击与防御技术研究综述]

被引:0
|
作者
Gao Y. [1 ,2 ,3 ,4 ]
Chen X.-F. [2 ]
Zhang Y.-Y. [2 ]
Wang W. [2 ]
Deng H.-H. [2 ]
Duan P. [5 ]
Chen P.-X. [5 ]
机构
[1] State Key Laboratory of Public Big Data, Guizhou University, Guiyang
[2] School of Cyber Science and Technology, Beihang University, Beijing
[3] Key Laboratory of Aerospace Network Security, Ministry of Industry and Information Technology, Beijing
[4] Zhongguancun Laboratory, Beijing
[5] Tencent Inc, Guangdong, Shenzhen
来源
基金
中国国家自然科学基金;
关键词
federated learning; privacy enhancing technology; privacy threats; robustness enhancement method; security threats;
D O I
10.11897/SP.J.1016.2023.01781
中图分类号
学科分类号
摘要
As an emerging technology of building machine learning (ML) model using distributed training data sets, federated learning (FL) can effectively solve the problem of local data privacy disclosure caused by joint modeling between different data owners. Therefore, it is widely used in many fields and has developed rapidly. FL keeps the data of participants local and only uploads model parameters to the server, which effectively protects the privacy of local data. However, the existing FL systems have been proved to have potential threats in the data collection stage, training stage and inference stage, which endanger the privacy of data and the robustness of the system. In the data collection stage and training stage, attackers may poison the training data or the model, thereby endangering the security of the system. In the inference stage, attackers may input samples to add minor malicious perturbations, causing the classifier to incorrectly classify the sample process with a very high probability, which will lead to privacy disclosure. Most of the existing research work describes attack and defense methods in ML, which are not necessarily applicable to FL models, and only focusses on a few attack threats and traditional defenses, lacking a detailed and comprehensive overview of the cutting-edge defenses. Starting with two kinds of potential threats: security threat and privacy threat, we give a detailed definition of security attributes in FL scenarios around confidentiality, integrity and availability (CIA triplet), and summarize various attack methods and defense means in FL systematically and comprehensively. Firstly, we summarize the horizontal and vertical federated learning (VFL) process and potential threats respectively, and analyze the basic concepts, implementation stages and existing schemes of common attacks such as poisoning attack, sample attack and inference attack from the perspectives of antagonistic attack and non-antagonistic attack. Adversarial attacks include poisoning attacks, adversarial sample attacks, free-riding attacks, Sybil attacks, and attacks against communication bottlenecks. Non-adversarial attacks include model extraction attacks, inference attacks, and GAN-based attacks. Further, according to different attack methods, defense means are divided into two categories: robustness enhancement methods and privacy enhancing technologies. The robustness enhancement methods mainly defend against antagonistic attacks, including data sanitization, robustness aggregation, anomaly detection, countermeasure training, knowledge distillation, pruning and other methods. The privacy enhancing technology mainly defends the system against non-antagonistic attacks, including homomorphic encryption, secure multi-party computing, differential privacy and blockchain. And the schemes related to robustness enhancement methods and privacy enhancement techniques in FL are sorted out and summarized. Finally, the paper gives future research direction of robustness and privacy in FL: (1) Establish a secure and stable attack detection and evaluation model, endow FL system with self inspection and evaluation capabilities, and provide real-time protection for internal and external environments; (2) Analyze and infer all possible potential attacks and privacy issues, and build a perfect security attack and defense system based on security encryption technology; (3) Study the unique attack and defense in VFL to solve the bottleneck problem of VFL in practical application; (4) Explore the conflict between robustness and privacy in FL to promote large-scale applications. © 2023 Science Press. All rights reserved.
引用
收藏
页码:1781 / 1805
页数:24
相关论文
共 50 条
  • [41] 基于联邦学习的安全与隐私保护技术研究
    吴彦霖
    邱硕
    柳亚男
    张正
    电脑知识与技术, 2022, 18 (36) : 71 - 74
  • [42] 数字化新型电力系统攻击与防御方法研究综述
    杨挺
    许哲铭
    赵英杰
    翟峰
    电力系统自动化, 2024, 48 (06) : 112 - 126
  • [43] 基于攻击模型的网络安全防御技术研究与实践
    彭星
    网络空间安全, 2023, 14 (06) : 86 - 90
  • [44] 无线传感器网络网络层的攻击与防御技术研究
    王振华
    无线互联科技, 2017, (01) : 16 - 18
  • [45] 监控系统雷电灾害防御技术研究与应用
    龚伟
    李衣长
    吴月惠
    巫圣灿
    福建建筑, 2017, (11) : 87 - 90
  • [46] 无线钓鱼接入点攻击与检测技术研究综述
    陈伟
    顾杨
    李晨阳
    吴震雄
    武汉大学学报(理学版), 2014, 60 (01) : 13 - 23
  • [47] 抗电路板级物理攻击的操作系统防御技术研究
    张倩颖
    赵世军
    软件学报, 2020, 31 (10) : 3120 - 3146
  • [48] 地球系统模式理论与技术研究综述
    秦昆
    周扬
    黄静
    刘娟
    喻雪松
    高牧寒
    刘东海
    高谢庆
    华南地理学报, 2023, 1 (01) : 36 - 50
  • [49] 基于机器学习的牵引供电远动系统异常攻击检测技术研究
    周泽岩
    程鹏
    方付生
    路涛
    软件工程, 2022, 25 (02) : 1 - 5
  • [50] 多馈入高压直流输电系统换相失败防御技术研究综述
    贺之渊
    高冲
    丁骁
    王成昊
    李婷婷
    吴凌锋
    高电压技术, 2024, 50 (07) : 2735 - 2746