Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models

被引:34
|
作者
Gong, Xueluan [1 ]
Wang, Qian [2 ]
Chen, Yanjiao [3 ]
Yang, Wang [4 ]
Jiang, Xinchang [1 ]
机构
[1] Wuhan Univ, Comp Sci, Wuhan, Peoples R China
[2] Wuhan Univ, Sch Comp Sci, Wuhan, Peoples R China
[3] Wuhan Univ, Wuhan, Peoples R China
[4] Wuhan Univ, Cyber Sci & Engn, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Computational modeling; Training data; Machine learning; Speech recognition; Propulsion; Internet; Security;
D O I
10.1109/MCOM.001.2000196
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Machine learning models have achieved state-of-the-art performance in various fields, from image classification to speech recognition. However, such models are trained with a large amount of sensitive training data, and are typically computationally expensive to build. As a result, many cloud providers (e.g., Google) have launched machine-learning-as-a-service, which helps clients benefit from the sophisticated cloud-based machine learning models via accessing public APIs. Such a business paradigm significantly expedites and simplifies the development circles. Unfortunately, the commercial value of such cloud-based machine learning models motivates attackers to conduct model extraction attacks for free use or as a springboard to conduct other attacks (e.g., craft adversarial examples in black-box settings). In this article, we conduct a thorough investigation of existing approaches to model extraction attacks and defenses on cloud-based models. We classify the state-of-the-art attack schemes into two categories based on whether the attacker aims to steal the property (i.e., parameters, hyperparameters, and architecture) or the functionality of the model. We also categorize defending schemes into two groups based on whether the scheme relies on output disturbance or query observation. We not only present a detailed survey of each method, but also demonstrate the comparison of both attack and defense approaches via experiments. We highlight several future directions in both model extraction attacks and its defenses, which shed light on possible avenues for further studies.
引用
收藏
页码:83 / 89
页数:7
相关论文
共 50 条
  • [21] Cloud-based Testbed for Simulation of Cyber Attacks
    Kouril, Daniel
    Rebok, Tomas
    Jirsik, Tomas
    Cegan, Jakub
    Drasar, Martin
    Vizvary, Martin
    Vykopal, Jan
    2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [22] The Development of Cloud-based Building Automation System and Creating Predictive Models of HVAC System with Machine Learning
    Matsuda, Yuki
    Ooka, Ryozo
    Ikeda, Shintaro
    2021 29TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2021, : 955 - 960
  • [23] Advanced Cloud-Based Prediction Models for Cardiovascular Disease: Integrating Machine Learning and Feature Selection Techniques
    Dhiyanesh B.
    Ammal S.G.
    Saranya K.
    Narayana K.E.
    SN Computer Science, 5 (5)
  • [24] Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks
    Feng, Ryan
    Hooda, Ashish
    Mangaokar, Neal
    Fawaz, Kassem
    Jha, Somesh
    Prakash, Atul
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 786 - 800
  • [25] Attacks on Machine Learning Models Based on the PyTorch Framework
    Namiot, D. E.
    Bidzhiev, T. M.
    AUTOMATION AND REMOTE CONTROL, 2024, 85 (03) : 263 - 271
  • [26] A Machine-Learning-Based Cyberattack Detector for a Cloud-Based SDN Controller
    Mozo, Alberto
    Karamchandani, Amit
    de la Cal, Luis
    Gomez-Canaval, Sandra
    Pastor, Antonio
    Gifre, Lluis
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [27] Cement strength prediction using cloud-based machine learning techniques
    Kumar, Nand
    Naranje, Vishal
    Salunkhe, Sachin
    JOURNAL OF STRUCTURAL INTEGRITY AND MAINTENANCE, 2020, 5 (04) : 244 - 251
  • [28] Adaptive resource planning for cloud-based services using machine learning
    Nawrocki, Piotr
    Grzywacz, Mikolaj
    Sniezynski, Bartlomiej
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 152 : 88 - 97
  • [29] Development of a cloud-based approach involving machine learning to estimate cyclodeviation
    Hirota, Masakazu
    Fukushima, Megumi
    Sasaki, Kakeru
    Kato, Kanako
    Usui, Chie
    Mizuno, Yoshinobu
    Hayashi, Takao
    Mizota, Atsushi
    INVESTIGATIVE OPHTHALMOLOGY & VISUAL SCIENCE, 2023, 64 (08)
  • [30] Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
    Attou, Hanaa
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    Farhaoui, Yousef
    BIG DATA MINING AND ANALYTICS, 2023, 6 (03) : 311 - 320