Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting cyberattacks targeting data managed by resource-constrained spectrum sensors. However, the amount of data needed to train models and the privacy concerns of such scenarios limit the applicability of centralized ML/DL-based approaches. Federated learning (FL) addresses these limitations by creating federated and privacy-preserving models. However, FL is vulnerable to malicious participants, and the impact of adversarial attacks on federated models detecting spectrum sensing data falsification (SSDF) attacks on spectrum sensors has not been studied. To address this challenge, the first contribution of this work is the creation of a novel dataset suitable for FL and modeling the behavior (usage of CPU, memory, or file system, among others) of resource-constrained spectrum sensors affected by different SSDF attacks. The second contribution is a pool of experiments analyzing and comparing the robustness of federated models according to i) three families of spectrum sensors, ii) eight SSDF attacks, iii) four scenarios dealing with unsupervised (anomaly detection) and supervised (binary classification) federated models, iv) up to 33% of malicious participants implementing data and model poisoning attacks, and v) four aggregation functions acting as anti-adversarial mechanisms to increase the models robustness.
翻译:与机器和深层学习(ML/DL)相结合的机器和深层学习(ML/DL)报告,在发现针对资源受限制的频谱传感器所管理的数据的网络攻击时,发现网络攻击时有良好的业绩;然而,培训模型所需的数据数量以及这类情景的隐私关切限制了基于中央ML/DL的方法的适用性; 联邦学习(FL)通过创建联邦化和隐私保护模式来解决这些限制; 然而,FL易受恶意参与者的伤害,以及对抗性攻击对检测频谱遥感数据伪造攻击(SSDF)的联邦化模型的影响尚未研究; 为了应对这一挑战,这项工作的第一项贡献是建立一个适合FL的新数据集,并模拟受不同SSDF攻击影响的资源受限制的频谱传感器的行为(使用CPU、记忆或文件系统等); 联邦化学习(FL) 分析并比较了根据(一) 3个频谱传感器组、8次SSDF攻击、三) 应对未监督的(异常检测) 和受监管的33级攻击性模型的(稳性模型) 执行的(硬性) 和制性模型的(稳性) 向4个模型参与者更新) 强化模型的(硬性) 强化模型和制化) 增强性模型的四种模型和制导化模型;