A Trojan Attack Against Smart Grid Federated Learning and Countermeasures

被引:0
|
作者
Bondok, Atef H. [1 ]
Badr, Mahmoud M. [2 ,3 ]
Mahmoud, Mohamed M. E. A. [4 ]
El-Toukhy, Ahmed T. [5 ,6 ]
Alsabaan, Maazen [7 ]
Amsaad, Fathi [8 ]
Ibrahem, Mohamed I. [3 ,9 ]
机构
[1] Eastern Connecticut State Univ, Dept Comp Sci, Willimantic, CT 06226 USA
[2] SUNY Polytech Inst, Coll Engn, Dept Network & Comp Secur, Utica, NY 13502 USA
[3] Benha Univ, Fac Engn Shoubra, Dept Elect Engn, Cairo 11672, Egypt
[4] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
[5] Univ South Carolina Aiken, Dept Comp Sci & Engn, Aiken, SC 29801 USA
[6] Al Azhar Univ, Fac Engn, Dept Elect Engn, Cairo 11884, Egypt
[7] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh 11451, Saudi Arabia
[8] Wright State Univ, Dept Comp Sci & Engn, Dayton, OH 45435 USA
[9] Augusta Univ, Sch Comp & Cyber Sci, Augusta, GA 30912 USA
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Electricity; Trojan horses; Training; Data models; Servers; Detectors; Smart grids; Privacy; Federated learning; Load modeling; security; smart power grid; Trojan attacks; ELECTRICITY THEFT DETECTION; EFFICIENT; SCHEME; SECURE;
D O I
10.1109/ACCESS.2024.3515099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In smart power grid, consumers can hack their smart meters to report low electricity consumption readings to reduce their bills launching electricity theft cyberattacks. This study investigates a Trojan attack in federated learning of a detector for electricity theft. In this attack, dishonest consumers train the detector on false data to later bypass detection, without degrading the detector's overall performance. We propose three defense strategies: Redundancy, Med-Selection and Combined-Selection. In the Redundancy approach, redundant consumers with similar consumption patterns are included in the federated learning process, so their correct data offsets the attackers' false data when the local models are aggregated. Med-Selection selects the median model parameters of consumers with similar usage patterns to reduce outlier influence. In Combined-Selection, we compare gradients from consumers with same consumption patterns to the median of all local models, leveraging the fact that honest consumers' gradients are closer to the median while malicious ones deviate. Our experiments using real-world data show the Trojan attack's success rate can reach 90%. However, our defense methods reduce the attack success rate to about 7%, 4%, and 3.3% for Redundancy, Med-Selection, and Combined-Selection, respectively, when 10% of consumers are malicious.
引用
收藏
页码:191828 / 191846
页数:19
相关论文
共 50 条
  • [31] Research on Block Chain Defense against Malicious Attack in Federated Learning
    Wu, Yiming
    Lu, Gehao
    Fu, Liyu
    Peng, Mao
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 67 - 72
  • [32] AAIA: an efficient aggregation scheme against inverting attack for federated learning
    Zhen Yang
    Shisong Yang
    Yunbo Huang
    José-Fernán Martínez
    Lourdes López
    Yuwen Chen
    International Journal of Information Security, 2023, 22 : 919 - 930
  • [33] Improved gradient leakage attack against compressed gradients in federated learning
    Ding, Xuyang
    Liu, Zhengqi
    You, Xintong
    Li, Xiong
    Vasilakos, Athhanasios V.
    NEUROCOMPUTING, 2024, 608
  • [34] Poisoning-Assisted Property Inference Attack Against Federated Learning
    Wang, Zhibo
    Huang, Yuting
    Song, Mengkai
    Wu, Libing
    Xue, Feng
    Ren, Kui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3328 - 3340
  • [35] Analyzing User-Level Privacy Attack Against Federated Learning
    Song, Mengkai
    Wang, Zhibo
    Zhang, Zhifei
    Song, Yang
    Wang, Qian
    Ren, Ju
    Qi, Hairong
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (10) : 2430 - 2444
  • [36] EAPA: An efficient authentication protocol against pollution attack for smart grid
    Mi Wen
    Jingsheng Lei
    Zhongqin Bi
    Jing Li
    Peer-to-Peer Networking and Applications, 2015, 8 : 1082 - 1089
  • [37] Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning
    Lyu, Xiaoting
    Han, Yufei
    Wang, Wei
    Liu, Jingkai
    Wang, Bin
    Liu, Jiqiang
    Zhang, Xiangliang
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 7, 2023, : 9020 - 9028
  • [38] Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud
    Ma, Zhuoran
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3429 - 3442
  • [39] EAPA: An efficient authentication protocol against pollution attack for smart grid
    Wen, Mi
    Lei, Jingsheng
    Bi, Zhongqin
    Li, Jing
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1082 - 1089
  • [40] On Topology Attack of a Smart Grid
    Kim, Jinsub
    Tong, Lang
    2013 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES (ISGT), 2013,