In terms of artificial intelligence, there are several security and privacy deficiencies in the traditional centralized training methods of machine learning models by a server. To address this limitation, federated learning (FL) has been proposed and is known for breaking down ``data silos" and protecting the privacy of users. However, FL has not yet gained popularity in the industry, mainly due to its security, privacy, and high cost of communication. For the purpose of advancing the research in this field, building a robust FL system, and realizing the wide application of FL, this paper sorts out the possible attacks and corresponding defenses of the current FL system systematically. Firstly, this paper briefly introduces the basic workflow of FL and related knowledge of attacks and defenses. It reviews a great deal of research about privacy theft and malicious attacks that have been studied in recent years. Most importantly, in view of the current three classification criteria, namely the three stages of machine learning, the three different roles in federated learning, and the CIA (Confidentiality, Integrity, and Availability) guidelines on privacy protection, we divide attack approaches into two categories according to the training stage and the prediction stage in machine learning. Furthermore, we also identify the CIA property violated for each attack method and potential attack role. Various defense mechanisms are then analyzed separately from the level of privacy and security. Finally, we summarize the possible challenges in the application of FL from the aspect of attacks and defenses and discuss the future development direction of FL systems. In this way, the designed FL system has the ability to resist different attacks and is more secure and stable.
翻译:在人工智能方面,一个服务器在机械学习模式的传统集中培训方法中存在若干安全和隐私缺陷。为了解决这一局限性,已经提出了联合学习(FL)的建议,并且以打破“数据仓”和保护用户隐私而著称。然而,FL尚未在行业中受到欢迎,这主要是因为其安全、隐私和高昂的通信费用。为了推进这一领域的研究,建立一个强有力的FL系统,并实现FL的广泛应用,本文将目前的FL系统可能的攻击和相应的防御系统系统系统地分为两类。首先,本文简要介绍了FL的基本工作流程和相关的攻击和防御知识。该文件回顾了近年来研究的大量关于隐私盗窃和恶意攻击的研究。最重要的是,鉴于目前的三种分类标准,即机器学习的三个阶段,在FL学习中的三个不同的作用,以及中央情报局(真实性、完整性和可用性)关于隐私保护的准则,我们将攻击方法分为两类,从培训阶段到相关的攻击和相关的攻击和防御知识。最后阶段,我们从FL系统设计的安全攻击和预测阶段,我们从F攻击的每一个攻击阶段到最终的防御机制,我们从F攻击和预测阶段,还要从F攻击的每一个攻击阶段,我们从F攻击的防御系统和预测阶段,从安全攻击的每一个攻击阶段, 学习了F的每一个攻击的阶段,我们可以理解的防御系统,我们从F的系统和预测系统, 学习的每一个的每一个的每一个的每一个的每一个的每个阶段,我们学习。 的每一个的每一个的每一个的每一个的阶段从最后的阶段,我们可以学习。