Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models

被引:28
|
作者
Gong, Xueluan [1 ]
Wang, Qian [2 ]
Chen, Yanjiao [3 ]
Yang, Wang [4 ]
Jiang, Xinchang [1 ]
机构
[1] Wuhan Univ, Comp Sci, Wuhan, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
[3] Wuhan Univ, Wuhan, Peoples R China
[4] Wuhan Univ, Cyber Sci & Engn, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Computational modeling; Training data; Machine learning; Speech recognition; Propulsion; Internet; Security;
D O I
10.1109/MCOM.001.2000196
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Machine learning models have achieved state-of-the-art performance in various fields, from image classification to speech recognition. However, such models are trained with a large amount of sensitive training data, and are typically computationally expensive to build. As a result, many cloud providers (e.g., Google) have launched machine-learning-as-a-service, which helps clients benefit from the sophisticated cloud-based machine learning models via accessing public APIs. Such a business paradigm significantly expedites and simplifies the development circles. Unfortunately, the commercial value of such cloud-based machine learning models motivates attackers to conduct model extraction attacks for free use or as a springboard to conduct other attacks (e.g., craft adversarial examples in black-box settings). In this article, we conduct a thorough investigation of existing approaches to model extraction attacks and defenses on cloud-based models. We classify the state-of-the-art attack schemes into two categories based on whether the attacker aims to steal the property (i.e., parameters, hyperparameters, and architecture) or the functionality of the model. We also categorize defending schemes into two groups based on whether the scheme relies on output disturbance or query observation. We not only present a detailed survey of each method, but also demonstrate the comparison of both attack and defense approaches via experiments. We highlight several future directions in both model extraction attacks and its defenses, which shed light on possible avenues for further studies.
引用
收藏
页码:83 / 89
页数:7
相关论文
共 50 条
  • [41] Hybrid feature extraction and integrated deep learning for cloud-based malware detection
    Nguyen, Pham Sy
    Huy, Tran Nhat
    Tuan, Tong Anh
    Trung, Pham Duy
    Long, Hoang Viet
    Computers and Security, 2025, 150
  • [42] Perspectives on Big Data, Cloud-Based Data Analysis and Machine Learning Systems
    Marozzo, Fabrizio
    Talia, Domenico
    BIG DATA AND COGNITIVE COMPUTING, 2023, 7 (02)
  • [43] Cloud-Based Machine Learning for Flood Policy Recommendations in Makassar City, Indonesia
    Rimba, Andi Besse
    Arumansawang, Andi
    Utama, I. Putu Wira
    Chapagain, Saroj Kumar
    Bunga, Made Nia
    Mohan, Geetha
    Setiawan, Kuncoro Teguh
    Osawa, Takahiro
    WATER, 2023, 15 (21)
  • [44] Cloud-based email phishing attack using machine and deep learning algorithm
    Umer Ahmed Butt
    Rashid Amin
    Hamza Aldabbas
    Senthilkumar Mohan
    Bader Alouffi
    Ali Ahmadian
    Complex & Intelligent Systems, 2023, 9 : 3043 - 3070
  • [45] Cloud-Based Diabetes Decision Support System Using Machine Learning Fusion
    Aftab, Shabib
    Alanazi, Saad
    Ahmad, Munir
    Khan, Muhammad Adnan
    Fatima, Areej
    Elmitwally, Nouh Sabri
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 1341 - 1357
  • [46] FC2: cloud-based cluster provisioning for distributed machine learning
    Ta Nguyen Binh Duong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (04): : 1299 - 1315
  • [47] PhishNot: A Cloud-Based Machine-Learning Approach to Phishing URL Detection
    Alani, Mohammed M.
    Tawfik, Hissam
    COMPUTER NETWORKS, 2022, 218
  • [48] Balance Deficits due to Cerebellar Ataxia: A Machine Learning and Cloud-Based Approach
    Ngo, Thang
    Pathirana, Pubudu N.
    Horne, Malcolm K.
    Power, Laura
    Szmulewicz, David J.
    Milne, Sarah C.
    Corben, Louise A.
    Roberts, Melissa
    Delatycki, Martin B.
    IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, 2021, 68 (05) : 1507 - 1517
  • [49] Cloud-based email phishing attack using machine and deep learning algorithm
    Butt, Umer Ahmed
    Amin, Rashid
    Aldabbas, Hamza
    Mohan, Senthilkumar
    Alouffi, Bader
    Ahmadian, Ali
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (03) : 3043 - 3070
  • [50] Cloud-Based Machine Learning for Predictive Analytics: Tool Wear Prediction in Milling
    Wu, Dazhong
    Jennings, Connor
    Terpenny, Janis
    Kumara, Soundar
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 2062 - 2069