Edge-Assisted Label-Flipping Attack Detection in Federated Learning

IF 6.3 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC IEEE Open Journal of the Communications Society Pub Date : 2024-11-13 DOI:10.1109/OJCOMS.2024.3496872
Nourah S. AlOtaibi;Muhamad Felemban;Sajjad Mahmood
{"title":"Edge-Assisted Label-Flipping Attack Detection in Federated Learning","authors":"Nourah S. AlOtaibi;Muhamad Felemban;Sajjad Mahmood","doi":"10.1109/OJCOMS.2024.3496872","DOIUrl":null,"url":null,"abstract":"Federated Learning (FL) has transformed machine learning by facilitating decentralized, privacy-focused data processing. Despite its advantages, FL remains vulnerable to data poisoning attacks, particularly Label-Flipping Attacks (LFA). In LFA, malicious clients deliberately mislabel local data, causing the global model to misclassify certain classes, thus undermining its integrity. Although centralized detection methods have been explored, there is a notable gap in addressing LFA within the decentralized Client-Edge-Cloud architecture, which is crucial for FL systems. This study introduces an innovative edge-assisted framework for early detection of LFA, crucial for real-time applications. To our knowledge, this is the first study to propose such an edge-assisted LFA detection mechanism. Through detailed conceptual and empirical analyses of LFA behavior, we identified a key characteristic: class-wise accuracy, particularly recall for specific classes, decreases due to label flipping, significantly increases the delta discrepancy with the edge model. Our method remains effective across varying numbers of malicious clients and model sizes, without requiring prior knowledge about the malicious clients. We developed two mitigation strategies: (1) the Zero Tolerance approach, which excludes entire client updates upon detecting adversarial behavior, and (2) the Zero Masking approach, which zeros out gradients for the flipped class while preserving others. This method leverages the direct influence of final layer gradients on class predictions. Extensive evaluation using three benchmark datasets shows that the proposed edge-assisted LFA detection framework outperforms traditional cloud-based methods. We demonstrate its superiority in latency, resource efficiency, and accuracy in detecting malicious clients, outperforming state-of-the-art defenses.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"5 ","pages":"7278-7300"},"PeriodicalIF":6.3000,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10752632","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10752632/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Federated Learning (FL) has transformed machine learning by facilitating decentralized, privacy-focused data processing. Despite its advantages, FL remains vulnerable to data poisoning attacks, particularly Label-Flipping Attacks (LFA). In LFA, malicious clients deliberately mislabel local data, causing the global model to misclassify certain classes, thus undermining its integrity. Although centralized detection methods have been explored, there is a notable gap in addressing LFA within the decentralized Client-Edge-Cloud architecture, which is crucial for FL systems. This study introduces an innovative edge-assisted framework for early detection of LFA, crucial for real-time applications. To our knowledge, this is the first study to propose such an edge-assisted LFA detection mechanism. Through detailed conceptual and empirical analyses of LFA behavior, we identified a key characteristic: class-wise accuracy, particularly recall for specific classes, decreases due to label flipping, significantly increases the delta discrepancy with the edge model. Our method remains effective across varying numbers of malicious clients and model sizes, without requiring prior knowledge about the malicious clients. We developed two mitigation strategies: (1) the Zero Tolerance approach, which excludes entire client updates upon detecting adversarial behavior, and (2) the Zero Masking approach, which zeros out gradients for the flipped class while preserving others. This method leverages the direct influence of final layer gradients on class predictions. Extensive evaluation using three benchmark datasets shows that the proposed edge-assisted LFA detection framework outperforms traditional cloud-based methods. We demonstrate its superiority in latency, resource efficiency, and accuracy in detecting malicious clients, outperforming state-of-the-art defenses.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
联盟学习中的边缘辅助标签翻转攻击检测
联合学习(FL)通过促进分散、注重隐私的数据处理,改变了机器学习。尽管具有这些优势,FL 仍然容易受到数据中毒攻击,尤其是标签翻转攻击(LFA)。在 LFA 中,恶意客户端会故意错误标注本地数据,导致全局模型错误分类某些类别,从而破坏其完整性。虽然集中式检测方法已经得到探索,但在去中心化的客户端-边缘-云架构中解决 LFA 问题还存在明显差距,而这对 FL 系统至关重要。本研究介绍了一种创新的边缘辅助框架,用于早期检测 LFA,这对实时应用至关重要。据我们所知,这是第一项提出这种边缘辅助 LFA 检测机制的研究。通过对 LFA 行为进行详细的概念和实证分析,我们发现了一个关键特征:分类准确率,尤其是特定类别的召回率,因标签翻转而下降,与边缘模型的 delta 差异显著增加。我们的方法在不同数量的恶意客户端和不同大小的模型中依然有效,而且不需要事先了解恶意客户端的情况。我们开发了两种缓解策略:(1) 零容忍方法,即在检测到恶意行为时排除整个客户端的更新;(2) 零掩蔽方法,即消除翻转类别的梯度,同时保留其他类别的梯度。这种方法利用了最终层梯度对类别预测的直接影响。使用三个基准数据集进行的广泛评估表明,所提出的边缘辅助 LFA 检测框架优于传统的基于云的方法。我们证明了它在延迟、资源效率和检测恶意客户端的准确性方面的优越性,超过了最先进的防御方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
13.70
自引率
3.80%
发文量
94
审稿时长
10 weeks
期刊介绍: The IEEE Open Journal of the Communications Society (OJ-COMS) is an open access, all-electronic journal that publishes original high-quality manuscripts on advances in the state of the art of telecommunications systems and networks. The papers in IEEE OJ-COMS are included in Scopus. Submissions reporting new theoretical findings (including novel methods, concepts, and studies) and practical contributions (including experiments and development of prototypes) are welcome. Additionally, survey and tutorial articles are considered. The IEEE OJCOMS received its debut impact factor of 7.9 according to the Journal Citation Reports (JCR) 2023. The IEEE Open Journal of the Communications Society covers science, technology, applications and standards for information organization, collection and transfer using electronic, optical and wireless channels and networks. Some specific areas covered include: Systems and network architecture, control and management Protocols, software, and middleware Quality of service, reliability, and security Modulation, detection, coding, and signaling Switching and routing Mobile and portable communications Terminals and other end-user devices Networks for content distribution and distributed computing Communications-based distributed resources control.
期刊最新文献
Link Scheduling in Satellite Networks via Machine Learning Over Riemannian Manifolds Harnessing Meta-Reinforcement Learning for Enhanced Tracking in Geofencing Systems Deep Reinforcement Learning-Based Anti-Jamming Approach for Fast Frequency Hopping Systems 5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1