On Feasibility of Server-side Backdoor Attacks on Split Learning

被引:2
|
作者
Tajalli, Behrad [1 ]
Ersoy, Oguzhan [1 ]
Picek, Stjepan [1 ]
机构
[1] Radboud Univ Nijmegen, ICIS, Nijmegen, Netherlands
关键词
Split Learning; Backdoor Attack; Cut layer;
D O I
10.1109/SPW59333.2023.00014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Split learning is a collaborative learning design that allows several participants (clients) to train a shared model while keeping their datasets private. In split learning, the network is split into two halves: clients have the initial part until the cut layer, and the remaining part of the network is on the server side. In the training process, clients feed the data into the first part of the network and send the output (smashed data) to the server, which uses it as the input for the remaining part of the network. Recent studies demonstrate that collaborative learning models, specifically federated learning, are vulnerable to security and privacy attacks such as model inference and backdoor attacks. While there have been studies regarding inference attacks on split learning, it has not yet been tested for backdoor attacks. This paper performs a novel backdoor attack on split learning and studies its effectiveness. Despite traditional backdoor attacks done on the client side, we inject the backdoor trigger from the server side. We provide two attack methods: one using a surrogate client and another using an autoencoder to poison the model via incoming smashed data and its outgoing gradient toward the innocent participants. The results show that despite using strong patterns and injection methods, split learning is highly robust and resistant to such poisoning attacks. While we get the attack success rate of 100% as our best result for the MNIST dataset, in most of the other cases, our attack shows little success when increasing the cut layer.
引用
收藏
页码:84 / 93
页数:10
相关论文
共 50 条
  • [1] Detection of Server-side Web Attacks
    Corona, Igino
    Giacinto, Giorgio
    [J]. PROCEEDINGS OF THE FIRST WORKSHOP ON APPLICATIONS OF PATTERN ANALYSIS, 2010, 11 : 160 - 166
  • [2] Preventing Server-Side Request Forgery Attacks
    Jabiyev, Bahruz
    Mirzaei, Omid
    Kharraz, Amin
    Kirda, Engin
    [J]. 36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 1626 - 1635
  • [3] Server-Side Code Injection Attacks: A Historical Perspective
    Fritz, Jakob
    Leita, Corrado
    Polychronakis, Michalis
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 41 - 61
  • [4] Personalized Federated Learning With Server-Side Information
    Song, Jaehun
    Oh, Min-Hwan
    Kim, Hyung-Sin
    [J]. IEEE ACCESS, 2022, 10 : 120245 - 120255
  • [5] Classification features for detecting server-side and client-side Web attacks
    Salem, Benferhat
    Karim, Tabia
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 729 - 733
  • [6] EMGAN: Early-Mix-GAN on Extracting Server-Side Model in Split Federated Learning
    Li, Jingtao
    Chen, Xing
    Yang, Li
    Rakin, Adnan Siraj
    Fan, Deliang
    Chakrabarti, Chaitali
    [J]. THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 12, 2024, : 13545 - 13553
  • [7] Server-side scripting
    Fish, S
    [J]. DR DOBBS JOURNAL, 1998, 23 (03): : 8 - 8
  • [8] VILLAIN: Backdoor Attacks Against Vertical Split Learning
    Bai, Yijie
    Chen, Yanjiao
    Zhang, Hanlei
    Xu, Wenyuan
    Weng, Haiqin
    Goodman, Dou
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2743 - 2760
  • [9] XSSDS: Server-side Detection of Cross-site Scripting Attacks
    Johns, Martin
    Engelmann, Bjoern
    Posegga, Joachim
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 335 - +
  • [10] A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud
    Godfrey, Michael
    Zulkernine, Mohammad
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 163 - 170