Adversarial Attacks in a Deep Reinforcement Learning based Cluster Scheduler

被引:99
|
作者
Zhang, Shaojun [1 ]
Wang, Chen [2 ]
Zomaya, Albert Y. [1 ]
机构
[1] Univ Sydney, Sch Comp Sci, Sydney, NSW, Australia
[2] CSIRO Data61, Sydney, NSW, Australia
关键词
scheduling; deep reinforcement learning; robustness; adversarial attack; directed acyclic graph;
D O I
10.1109/mascots50786.2020.9285955
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A scheduler is essential for resource management in a shared computer cluster, particularly scheduling algorithms play an important role in meeting service level objectives of user applications in large scale clusters that underlie cloud computing. Traditional cluster schedulers are often based on empirical observations of patterns of jobs running on them. It is unclear how effective they are for capturing the patterns of a variety of jobs in clouds. Recent advances in Deep Reinforcement Learning (DRL) promise a new optimization framework for a scheduler to systematically address the problem. A DRL-based scheduler can extract detailed patterns from job features and the dynamics of cloud resource utilization for better scheduling decisions. However, the deep neural network models used by the scheduler might be vulnerable to adversarial attacks. There is limited research investigating the vulnerability in DRL-based schedulers. In this paper, we give a white-box attack method to show that malicious users can exploit the scheduling vulnerability to benefit certain jobs. The proposed attack method only requires minor perturbations job features to significantly change the scheduling priority of these jobs. We implement both greedy and critical path based algorithms to facilitate the attacks to a stateof-the-art DRL based scheduler called Decima. Our extensive experiments on TPC-H workloads show a 62% and 66% success rate of attacks with the two algorithms. Successful attacks achieve a 18.6% and 17.5% completion time reduction.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [41] Adversarial Attacks Against Reinforcement Learning-Based Portfolio Management Strategy
    Chen, Yu-Ying
    Chen, Chiao-Ting
    Sang, Chuan-Yun
    Yang, Yao-Chun
    Huang, Szu-Hao
    [J]. IEEE ACCESS, 2021, 9 : 50667 - 50685
  • [42] Reinforcement-learning-based Adversarial Attacks Against Vulnerability Detection Models
    Chen, Si-Ran
    Wu, Jing-Zheng
    Ling, Xiang
    Luo, Tian-Yue
    Liu, Jia-Yu
    Wu, Yan-Jun
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (08): : 3647 - 3667
  • [43] DQ Scheduler: Deep Reinforcement Learning Based Controller Synchronization in Distributed SDN
    Zhang, Ziyao
    Ma, Liang
    Poularakis, Konstantinos
    Leung, Kin K.
    Wu, Lingfei
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [44] DRLS: A Deep Reinforcement Learning Based Scheduler for Time-Triggered Ethernet
    Zhong, Chunmeng
    Jia, Hongyu
    Wan, Hai
    Zhao, Xibin
    [J]. 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [45] A Deep Reinforcement Learning-Based Resource Scheduler for Massive MIMO Networks
    An, Qing
    Segarra, Santiago
    Dick, Chris
    Sabharwal, Ashutosh
    Doost-Mohammady, Rahman
    [J]. IEEE Transactions on Machine Learning in Communications and Networking, 2023, 1 : 242 - 257
  • [46] Adversarial Attacks and Defenses for Deep Learning Models
    Li M.
    Jiang P.
    Wang Q.
    Shen C.
    Li Q.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (05): : 909 - 926
  • [47] Evasion and Causative Attacks with Adversarial Deep Learning
    Shi, Yi
    Sagduyu, Yalin E.
    [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 243 - 248
  • [48] Defense Against Adversarial Attacks in Deep Learning
    Li, Yuancheng
    Wang, Yimeng
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (01):
  • [49] Adversarial Examples: Attacks and Defenses for Deep Learning
    Yu, Xiaoyong
    He, Pan
    Zhu, Qile
    Li, Xiaolin
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 30 (09) : 2805 - 2824
  • [50] Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses
    Tekgul, Buse G. A.
    Wang, Shelly
    Marchal, Samuel
    Asokan, N.
    [J]. COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 384 - 404