SlideShare a Scribd company logo
1 of 8
Information Security Research Group
Poisoning Attacks on Federated Learning-based IoT
Intrusion Detection System
By
Sai Kiran Kadam
Federated Learning (FL) - Intrusion Detection in IoT - Poisoning Attacks
● FL for IoT
○ Train multi-party data located in isolated islands without the need to expose data among the
parties.
○ Data owners collaboratively train a model without exposing their data to each other.
● Intrusion detection - Anomaly detection
○ Training a model characterizing normal device behavior and using this model for detecting
”anomalous” behavior that deviates from the normal model.
○ FL has been emerging for distributed ML model training and seems to be an adequate tool.
● Data poisoning attacks - Idea of the paper
○ Implant a backdoor in the aggregated model to incorrectly classify malicious data as benign.
2
System Model and Threat Model
● System Model:
● Threat Model:
○ Attacker’s goal: To corrupt the global model by aggregator so that the model wouldn’t detect
malicious traffic as anomalous.
○ The attacker controls a number of IoT devices and can also connect their devices to the
security gateways
3
Data Poisoning Attack
● Backdoor the model:
○ Inject small amount of malicious data into the benign traffic which will not be detected as
anomalous.
○ The model will not detect the backdoored traffic as malicious, security gateway uses this data
to train the local model that is sent to the aggregator, hence affecting the global model.
○ Challenges of the implanted backdoor:
■ To evade
● the traffic anomaly detection of the global model and
● the model anomaly detection of the aggregator.
4
Experimental Setup
● Datasets used:
○ D¨IoT-Benign: IoT traffic generated from 18 IoT devices deployed in a real-word smart home.
○ UNSW-Benign: IoT traffic generated from 28 IoT devices in an office for 20 days.
○ D¨IoT-Attack: Attack traffic generated by 5 IoT devices infected by the Mirai malware which
has 13 attack types, e.g., infection, scanning, SYN flood, HTTP flood, etc.
● Implementation:
○ Framework - PyTorch,
○ server with 20X Intel Xeon CPU cores, 64GB RAM, 4X NVIDIA GeForce GPUs,
○ Ubuntu 18.04 LTS OS.
5
Metrics
● Backdoor Accuracy (BA)
○ fraction of malicious samples that the system falsely classifies as normal samples to the total
malicious samples
● Main Task Accuracy (MA)
○ fraction of normal samples that the system correctly classifies as normal traffic to the total
normal samples.
● Poisoned Data Rate (PDR)
○ ratio of poisoned traffic injected in the network with respect to the benign traffic the
compromised devices generate.
● Poisoned Model Rate (PMR)
○ fraction of the number of the gateways that have compromised IoT devices to the total number
of the gateways.
6
Results
BA for experiment conducted on the Netatmo data (100 clients)
7
Conclusion
The implanted backdoor attack bypasses the existing defences and is effective which raises
the need for new defence techniques against attacks on FL-IoT intrusion detection systems.
Bibliography:
Nguyen, T.D., Rieger, P., Miettinen, M. and Sadeghi, A.R., 2020. Poisoning attacks on federated learning-based IoT intrusion detection
system. In Proc. Workshop Decentralized IoT Syst. Secur.(DISS) (pp. 1-7).
Thank you
8

More Related Content

What's hot

What's hot (20)

Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18
 
Federated Machine Learning Framework
Federated Machine Learning FrameworkFederated Machine Learning Framework
Federated Machine Learning Framework
 
Threats to federated learning a survey
Threats to federated learning  a surveyThreats to federated learning  a survey
Threats to federated learning a survey
 
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data InsightsModeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
Modeling Cybersecurity with Neo4j, Based on Real-Life Data Insights
 
A Privacy Framework for Hierarchical Federated Learning
A Privacy Framework for Hierarchical Federated LearningA Privacy Framework for Hierarchical Federated Learning
A Privacy Framework for Hierarchical Federated Learning
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Generative AI Risks & Concerns
Generative AI Risks & ConcernsGenerative AI Risks & Concerns
Generative AI Risks & Concerns
 
MLOps and Data Quality: Deploying Reliable ML Models in Production
MLOps and Data Quality: Deploying Reliable ML Models in ProductionMLOps and Data Quality: Deploying Reliable ML Models in Production
MLOps and Data Quality: Deploying Reliable ML Models in Production
 
Real World End to End machine Learning Pipeline
Real World End to End machine Learning PipelineReal World End to End machine Learning Pipeline
Real World End to End machine Learning Pipeline
 
AWS VS AZURE VS GCP.pptx
AWS VS AZURE VS GCP.pptxAWS VS AZURE VS GCP.pptx
AWS VS AZURE VS GCP.pptx
 
Deploy and Serve Model from Azure Databricks onto Azure Machine Learning
Deploy and Serve Model from Azure Databricks onto Azure Machine LearningDeploy and Serve Model from Azure Databricks onto Azure Machine Learning
Deploy and Serve Model from Azure Databricks onto Azure Machine Learning
 
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
Adversarial Attacks on A.I. Systems — NextCon, Jan 2019
 
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdfSuresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
Suresh Poopandi_Generative AI On AWS-MidWestCommunityDay-Final.pdf
 
Generative AI For Everyone on AWS.pdf
Generative AI For Everyone on AWS.pdfGenerative AI For Everyone on AWS.pdf
Generative AI For Everyone on AWS.pdf
 
Building responsible AI models in Azure Machine Learning.pptx
Building responsible AI models in Azure Machine Learning.pptxBuilding responsible AI models in Azure Machine Learning.pptx
Building responsible AI models in Azure Machine Learning.pptx
 
Government GraphSummit: Leveraging Graphs for AI and ML
Government GraphSummit: Leveraging Graphs for AI and MLGovernment GraphSummit: Leveraging Graphs for AI and ML
Government GraphSummit: Leveraging Graphs for AI and ML
 
Intro to LLMs
Intro to LLMsIntro to LLMs
Intro to LLMs
 
Adversarial Attacks and Defense
Adversarial Attacks and DefenseAdversarial Attacks and Defense
Adversarial Attacks and Defense
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Introduction to MLflow
Introduction to MLflowIntroduction to MLflow
Introduction to MLflow
 

Similar to Poisoning attacks on Federated Learning based IoT Intrusion Detection System

Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Editor IJMTER
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
SujanTimalsina5
 

Similar to Poisoning attacks on Federated Learning based IoT Intrusion Detection System (20)

Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
M1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdfM1-02-HowCriminalsPlan.pdf
M1-02-HowCriminalsPlan.pdf
 
MINI PROJECT s.pptx
MINI PROJECT s.pptxMINI PROJECT s.pptx
MINI PROJECT s.pptx
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
BSides Rochester 2018: Jonathan Myers: IoT Malware Detection with Machine Lea...
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
Android Malware Detection Literature Review
Android Malware Detection Literature ReviewAndroid Malware Detection Literature Review
Android Malware Detection Literature Review
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
M0704071074
M0704071074M0704071074
M0704071074
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 

Poisoning attacks on Federated Learning based IoT Intrusion Detection System

  • 1. Information Security Research Group Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System By Sai Kiran Kadam
  • 2. Federated Learning (FL) - Intrusion Detection in IoT - Poisoning Attacks ● FL for IoT ○ Train multi-party data located in isolated islands without the need to expose data among the parties. ○ Data owners collaboratively train a model without exposing their data to each other. ● Intrusion detection - Anomaly detection ○ Training a model characterizing normal device behavior and using this model for detecting ”anomalous” behavior that deviates from the normal model. ○ FL has been emerging for distributed ML model training and seems to be an adequate tool. ● Data poisoning attacks - Idea of the paper ○ Implant a backdoor in the aggregated model to incorrectly classify malicious data as benign. 2
  • 3. System Model and Threat Model ● System Model: ● Threat Model: ○ Attacker’s goal: To corrupt the global model by aggregator so that the model wouldn’t detect malicious traffic as anomalous. ○ The attacker controls a number of IoT devices and can also connect their devices to the security gateways 3
  • 4. Data Poisoning Attack ● Backdoor the model: ○ Inject small amount of malicious data into the benign traffic which will not be detected as anomalous. ○ The model will not detect the backdoored traffic as malicious, security gateway uses this data to train the local model that is sent to the aggregator, hence affecting the global model. ○ Challenges of the implanted backdoor: ■ To evade ● the traffic anomaly detection of the global model and ● the model anomaly detection of the aggregator. 4
  • 5. Experimental Setup ● Datasets used: ○ D¨IoT-Benign: IoT traffic generated from 18 IoT devices deployed in a real-word smart home. ○ UNSW-Benign: IoT traffic generated from 28 IoT devices in an office for 20 days. ○ D¨IoT-Attack: Attack traffic generated by 5 IoT devices infected by the Mirai malware which has 13 attack types, e.g., infection, scanning, SYN flood, HTTP flood, etc. ● Implementation: ○ Framework - PyTorch, ○ server with 20X Intel Xeon CPU cores, 64GB RAM, 4X NVIDIA GeForce GPUs, ○ Ubuntu 18.04 LTS OS. 5
  • 6. Metrics ● Backdoor Accuracy (BA) ○ fraction of malicious samples that the system falsely classifies as normal samples to the total malicious samples ● Main Task Accuracy (MA) ○ fraction of normal samples that the system correctly classifies as normal traffic to the total normal samples. ● Poisoned Data Rate (PDR) ○ ratio of poisoned traffic injected in the network with respect to the benign traffic the compromised devices generate. ● Poisoned Model Rate (PMR) ○ fraction of the number of the gateways that have compromised IoT devices to the total number of the gateways. 6
  • 7. Results BA for experiment conducted on the Netatmo data (100 clients) 7
  • 8. Conclusion The implanted backdoor attack bypasses the existing defences and is effective which raises the need for new defence techniques against attacks on FL-IoT intrusion detection systems. Bibliography: Nguyen, T.D., Rieger, P., Miettinen, M. and Sadeghi, A.R., 2020. Poisoning attacks on federated learning-based IoT intrusion detection system. In Proc. Workshop Decentralized IoT Syst. Secur.(DISS) (pp. 1-7). Thank you 8