MITDBA: Mitigating Dynamic Backdoor Attacks in Federated Learning for IoT Applications

Yongkang Wang, Di Hua Zhai*, Dongyu Han, Yuyin Guan, Yuanqing Xia

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

Federated learning (FL) is widely used in the Internet of Things (IoT) systems. However, FL is susceptible to backdoor attacks due to its inherently distributed and privacy-preserving nature. Existing studies assume that backdoor triggers on different malicious clients are universal, and most defense algorithms are designed to counter backdoor attacks based on this assumption. Recently, dynamic backdoor attacks have been proposed to undermine robust algorithms in centralized machine learning. We introduce dynamic backdoor attacks into the FL system and develop three types of dynamic backdoors named Aggregation, Single, and Continuous to target the FL system. To defend against such attacks, we propose a novel robust algorithm called MITDBA, which utilizes gramian information to capture high-order representations, then employs spectral signatures to detect and remove malicious clients, and finally utilizes clipping operations to filter the selected local models during the aggregation process. We conduct attack and defense experiments on MNIST, CIFAR-10, and GTSRB data sets. The experimental results demonstrate that our designed attack strategies can successfully insert dynamic backdoors into the global model, bypassing the existing state-of-the-art defenses, but these attacks can be effectively mitigated by MITDBA.

Original languageEnglish
Pages (from-to)10115-10132
Number of pages18
JournalIEEE Internet of Things Journal
Volume11
Issue number6
DOIs
Publication statusPublished - 15 Mar 2024

Keywords

  • Dynamic backdoor
  • federated learning (FL)
  • gram matrix
  • robust
  • spectral signature

Fingerprint

Dive into the research topics of 'MITDBA: Mitigating Dynamic Backdoor Attacks in Federated Learning for IoT Applications'. Together they form a unique fingerprint.

Cite this