Nourah S. AlOtaibi;Muhamad Felemban;Sajjad Mahmood
{"title":"Edge-Assisted Label-Flipping Attack Detection in Federated Learning","authors":"Nourah S. AlOtaibi;Muhamad Felemban;Sajjad Mahmood","doi":"10.1109/OJCOMS.2024.3496872","DOIUrl":null,"url":null,"abstract":"Federated Learning (FL) has transformed machine learning by facilitating decentralized, privacy-focused data processing. Despite its advantages, FL remains vulnerable to data poisoning attacks, particularly Label-Flipping Attacks (LFA). In LFA, malicious clients deliberately mislabel local data, causing the global model to misclassify certain classes, thus undermining its integrity. Although centralized detection methods have been explored, there is a notable gap in addressing LFA within the decentralized Client-Edge-Cloud architecture, which is crucial for FL systems. This study introduces an innovative edge-assisted framework for early detection of LFA, crucial for real-time applications. To our knowledge, this is the first study to propose such an edge-assisted LFA detection mechanism. Through detailed conceptual and empirical analyses of LFA behavior, we identified a key characteristic: class-wise accuracy, particularly recall for specific classes, decreases due to label flipping, significantly increases the delta discrepancy with the edge model. Our method remains effective across varying numbers of malicious clients and model sizes, without requiring prior knowledge about the malicious clients. We developed two mitigation strategies: (1) the Zero Tolerance approach, which excludes entire client updates upon detecting adversarial behavior, and (2) the Zero Masking approach, which zeros out gradients for the flipped class while preserving others. This method leverages the direct influence of final layer gradients on class predictions. Extensive evaluation using three benchmark datasets shows that the proposed edge-assisted LFA detection framework outperforms traditional cloud-based methods. We demonstrate its superiority in latency, resource efficiency, and accuracy in detecting malicious clients, outperforming state-of-the-art defenses.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7278-7300"},"PeriodicalIF":6.3000,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10752632","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10752632/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Federated Learning (FL) has transformed machine learning by facilitating decentralized, privacy-focused data processing. Despite its advantages, FL remains vulnerable to data poisoning attacks, particularly Label-Flipping Attacks (LFA). In LFA, malicious clients deliberately mislabel local data, causing the global model to misclassify certain classes, thus undermining its integrity. Although centralized detection methods have been explored, there is a notable gap in addressing LFA within the decentralized Client-Edge-Cloud architecture, which is crucial for FL systems. This study introduces an innovative edge-assisted framework for early detection of LFA, crucial for real-time applications. To our knowledge, this is the first study to propose such an edge-assisted LFA detection mechanism. Through detailed conceptual and empirical analyses of LFA behavior, we identified a key characteristic: class-wise accuracy, particularly recall for specific classes, decreases due to label flipping, significantly increases the delta discrepancy with the edge model. Our method remains effective across varying numbers of malicious clients and model sizes, without requiring prior knowledge about the malicious clients. We developed two mitigation strategies: (1) the Zero Tolerance approach, which excludes entire client updates upon detecting adversarial behavior, and (2) the Zero Masking approach, which zeros out gradients for the flipped class while preserving others. This method leverages the direct influence of final layer gradients on class predictions. Extensive evaluation using three benchmark datasets shows that the proposed edge-assisted LFA detection framework outperforms traditional cloud-based methods. We demonstrate its superiority in latency, resource efficiency, and accuracy in detecting malicious clients, outperforming state-of-the-art defenses.
期刊介绍:
The IEEE Open Journal of the Communications Society (OJ-COMS) is an open access, all-electronic journal that publishes original high-quality manuscripts on advances in the state of the art of telecommunications systems and networks. The papers in IEEE OJ-COMS are included in Scopus. Submissions reporting new theoretical findings (including novel methods, concepts, and studies) and practical contributions (including experiments and development of prototypes) are welcome. Additionally, survey and tutorial articles are considered. The IEEE OJCOMS received its debut impact factor of 7.9 according to the Journal Citation Reports (JCR) 2023.
The IEEE Open Journal of the Communications Society covers science, technology, applications and standards for information organization, collection and transfer using electronic, optical and wireless channels and networks. Some specific areas covered include:
Systems and network architecture, control and management
Protocols, software, and middleware
Quality of service, reliability, and security
Modulation, detection, coding, and signaling
Switching and routing
Mobile and portable communications
Terminals and other end-user devices
Networks for content distribution and distributed computing
Communications-based distributed resources control.