Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack

被引:23
|
作者
Yan, Haonan [1 ]
Li, Xiaoguang [1 ,2 ]
Li, Hui [1 ]
Li, Jiamin [1 ]
Sun, Wenhai [2 ]
Li, Fenghua [3 ,4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710126, Peoples R China
[2] Purdue Univ, Dept Comp & Informat Technol, W Lafayette, IN 47907 USA
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
关键词
Adaptation models; Privacy; Monitoring; Data models; Mathematical model; Training; Differential privacy; Machine learning; model extraction attack; extraction status assessment; differential privacy; privacy budget allocation;
D O I
10.1109/TDSC.2021.3069258
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Public intelligent services enabled by machine learning algorithms are vulnerable to model extraction attacks that can steal confidential information of the learning models through public queries. Though there are some protection options such as differential privacy (DP) and monitoring, which are considered promising techniques to mitigate this attack, we still find that the vulnerability persists. In this article, we propose an adaptive query-flooding parameter duplication (QPD) attack. The adversary can infer the model information with black-box access and no prior knowledge of any model parameters or training data via QPD. We also develop a defense strategy using DP called monitoring-based DP (MDP) against this new attack. In MDP, we first propose a novel real-time model extraction status assessment scheme called Monitor to evaluate the situation of the model. Then, we design a method to guide the differential privacy budget allocation called APBA adaptively. Finally, all DP-based defenses with MDP could dynamically adjust the amount of noise added in the model response according to the result from Monitor and effectively defends the QPD attack. Furthermore, we thoroughly evaluate and compare the QPD attack and MDP defense performance on real-world models with DP and monitoring protection.
引用
收藏
页码:2680 / 2694
页数:15
相关论文
共 50 条
  • [41] A privacy mechanism for mobile-based urban traffic monitoring
    Wang, Chi
    Liu, Hua
    Wright, Kwame-Lante
    Krishnamachari, Bhaskar
    Annavaram, Murali
    PERVASIVE AND MOBILE COMPUTING, 2015, 20 : 1 - 12
  • [42] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Naveen Kumar
    Ashutosh Kumar Singh
    Shashank Srivastava
    International Journal of Networked and Distributed Computing, 2018, 6 (3) : 174 - 184
  • [43] A Triggered Delay-based Approach against Cache Privacy Attack in NDN
    Kumar, Naveen
    Singh, Ashutosh Kumar
    Srivastava, Shashank
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2018, 6 (03) : 174 - 184
  • [44] A Decentralized Mechanism Based on Differential Privacy for Privacy-Preserving Computation in Smart Grid
    Zheng, Zhigao
    Wang, Tao
    Bashir, Ali Kashif
    Alazab, Mamoun
    Mumtaz, Shahid
    Wang, Xiaoyan
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (11) : 2915 - 2926
  • [45] A Charging/Rewarding mechanism-based Interest Flooding Attack mitigation strategy in NDN
    Zhang, Xin
    Li, Ru
    2019 IFIP/IEEE SYMPOSIUM ON INTEGRATED NETWORK AND SERVICE MANAGEMENT (IM), 2019, : 402 - 407
  • [46] Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection
    Liang, Siyuan
    Wu, Baoyuan
    Fan, Yanbo
    Wei, Xingxing
    Cao, Xiaochun
    2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 7677 - 7687
  • [47] An Owner's Will Based Model against Malicious Attack
    Zhou Zheng
    Zhang Yun
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 318 - 321
  • [48] Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness
    Sun, Feixian
    Wu, Zhigang
    ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 66 - +
  • [49] An efficient privacy-preserving model based on OMFTSA for query optimization in crowdsourcing
    Renukadevi, M.
    Anita, E. A. Mary
    Geetha, D. Mohana
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (24):
  • [50] Characteristics and monitoring-based analysis on deformation mechanism of Jianshanying landslide, Guizhou Province, southwestern China
    Dong J.
    Li H.
    Wang Y.
    Zhang Y.
    Arabian Journal of Geosciences, 2021, 14 (3)