Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack

被引:23
|
作者
Yan, Haonan [1 ]
Li, Xiaoguang [1 ,2 ]
Li, Hui [1 ]
Li, Jiamin [1 ]
Sun, Wenhai [2 ]
Li, Fenghua [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710126, Peoples R China
[2] Purdue Univ, Dept Comp & Informat Technol, W Lafayette, IN 47907 USA
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
关键词
Adaptation models; Privacy; Monitoring; Data models; Mathematical model; Training; Differential privacy; Machine learning; model extraction attack; extraction status assessment; differential privacy; privacy budget allocation;
D O I
10.1109/TDSC.2021.3069258
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Public intelligent services enabled by machine learning algorithms are vulnerable to model extraction attacks that can steal confidential information of the learning models through public queries. Though there are some protection options such as differential privacy (DP) and monitoring, which are considered promising techniques to mitigate this attack, we still find that the vulnerability persists. In this article, we propose an adaptive query-flooding parameter duplication (QPD) attack. The adversary can infer the model information with black-box access and no prior knowledge of any model parameters or training data via QPD. We also develop a defense strategy using DP called monitoring-based DP (MDP) against this new attack. In MDP, we first propose a novel real-time model extraction status assessment scheme called Monitor to evaluate the situation of the model. Then, we design a method to guide the differential privacy budget allocation called APBA adaptively. Finally, all DP-based defenses with MDP could dynamically adjust the amount of noise added in the model response according to the result from Monitor and effectively defends the QPD attack. Furthermore, we thoroughly evaluate and compare the QPD attack and MDP defense performance on real-world models with DP and monitoring protection.
引用
收藏
页码:2680 / 2694
页数:15
相关论文
共 50 条
  • [1] Mechanism of defending P2P from flooding-based DDoS attack
    Geng, Ji
    Ma, Xin-Xin
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (06): : 987 - 992
  • [2] A novel architecture for detecting and defending against flooding-based DDoS attacks
    Shi, Y
    Yang, XY
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 364 - 374
  • [3] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51
  • [4] Model poisoning attack in differential privacy-based federated learning
    Yang, Ming
    Cheng, Hang
    Chen, Fei
    Liu, Ximeng
    Wang, Meiqing
    Li, Xibin
    INFORMATION SCIENCES, 2023, 630 : 158 - 172
  • [5] A Differential Privacy-Based Query Model for Sustainable Fog Data Centers
    Du, Miao
    Wang, Kun
    Liu, Xiulong
    Guo, Song
    Zhang, Yan
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02): : 145 - 155
  • [6] A Skyline Query Method Based on Differential Privacy Protection
    Zhang L.
    Yang Y.
    Jin F.
    Li S.
    Hao Z.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2022, 57 (05): : 982 - 989
  • [7] A Profit-maximizing Mechanism for Query-based Data Trading with Personalized Differential Privacy
    Cai, Hui
    Zhu, Yanmin
    Li, Jie
    Yu, Jiadi
    COMPUTER JOURNAL, 2021, 64 (02): : 264 - 280
  • [8] A Blockchain-Based Continuous Query Differential Privacy Algorithm
    Ouyang, Heng
    Lyu, Hongqin
    Long, Shigong
    Liu, Hai
    Ding, Hongfa
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT 2021, 2022, 13148 : 604 - 615
  • [9] Graph-based modelling of query sets for differential privacy
    Inan, Ali
    Gursoy, Mehmet Emre
    Esmerdag, Emir
    Saygin, Yucel
    28TH INTERNATIONAL CONFERENCE ON SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT (SSDBM) 2016), 2016,
  • [10] A Policy based preventive measure against flooding attack in MANETs
    Kumar, Mohan S. B.
    Vijay, Anand K. M.
    Suhas, N. S.
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1612 - 1616