Project ALVI:�Privacy-Driven Defenses: Federated Learning Security & Authentication
R24-053
Team members
Mr. Kanishka yapa
supervisor
Mr. Samadhi Rathnayake
dr. Kasun Karunarathne
Co-supervisor
External supervisor
Peiris B.L.H.D
J.P.A.S. Pathmendre
Athauda A.M.I.R.B
A.R.W.M.V. Hasaranga
01
introduction
02
background
background
Existing security implementations in federated learning
Research problem
This Photo by Unknown Author is licensed under CC BY
Our
objectives
main objectives
sub objectives
System overview
01
02
03
04
CodeNexa
Dynamic watermarking technique
hydraguard
Backdoor immunity
SECUNID
Enhancing Global Model Security
S.H.I.E.L.D.
Security in VFL
System diagram
Peiris B.L.H.D IT21110184
Cyber Security
IT21110184 | Peiris B.L.H.D| R24-053
Component 1
CODE NEXA :
DYNAMIC WATERMARKING TECHNIQUE FOR FEDERATED LEARNING
IT21110184 | Peiris B.L.H.D| R24-053
BACKGROUND
IT21110184 | Peiris B.L.H.D| R24-053
What existing efforts address the challenges of model ownership and intellectual property protection in federated learning?
IT21110184 | Peiris B.L.H.D| R24-053
OBJECTI VE
Developing a Dynamic Watermarking Technique for Federated Learning to improve model integrity.
Sub Objective 1
Design and Implement Temporal Variation Mechanism
Sub Objective 2
Integrate Dynamic Watermarking with Federated Learning System
Sub Objective 3
Evaluate and Optimize for Non-IID Data Scenarios
RESEARCH GAP
IT21110184 | Peiris B.L.H.D| R24-053
Paper 1
Paper 2
Paper 3
Paper 4
Proposed Solution
Embedding watermarks with low
computational overhead
Preventing watermark removal attacks
Performance impact
Adapt with non-IID data
| Paper 1 | Paper 2 | Paper 3 | Paper 4 | Proposed Solution |
Embedding watermarks with low computational overhead | | | | | |
Preventing watermark removal attacks | | | | | |
Performance impact | | | | | |
Adapt with non-IID data | | | | | |
METHODOLOGY
COMPONENT DIAGRAM
ris B.L.H.D| R24-053
PROJECT COMPLETION
OVERALL PROGRESS
IT21110184 | Peiris B.L.H.D| R24-053
PROJECT COMPLETION
WORK DONE
IT21110184 | Peiris B.L.H.D| R24-053
Develop a dynamic watermarking technique
PROJECT COMPLETION
WORK DONE
IT21110184 | Peiris B.L.H.D| R24-053
Watermark generating part.
PROJECT COMPLETION
WORK DONE
Create a log For watermark.
IT21110184 | Peiris B.L.H.D| R24-053
PROJECT COMPLETION
WORK DONE
IT21110184 | Peiris B.L.H.D| R24-053
output
PROJECT COMPLETION
WORK DONE
IT21110184 | Peiris B.L.H.D| R24-053
output
Evaluate the impact of the dynamic watermarking technique on model performance
IT21110184 | Peiris B.L.H.D| R24-053
FUTURE WORK
Analyze the watermark detection and authentication capabilities
Assess the technique's resilience against potential attacks or watermark removal attempts
Testing the implementation with different datasets and model architectures
TECHNOLOGIES
IT21110184 | Peiris B.L.H.D| R24-053
PyTorch Distributed
01
Python
PyTorch
02
03
04
0
Github
REFERENCES
IT21110184 | Peiris B.L.H.D| R24-053
Y. Li, X. Zhu, J. Lei, and F. Li, "Ensuring Federated Ownership Verification with FedBack: A Trigger- Based Watermarking Approach," in 2021 IEEE International Conference on Communications (ICC), pp. 1–6, 2021.
T. Li, Z. Zhou, M. Koushanfar, D. Boneh, and H. Shacham, "FedIPR: Ownership Verification for Federated Deep Neural Network Models," in Proceedings of the 2020 IEEE INFOCOM, pp. 1–9, 2020.
X. Zhang, M. He, L. Song, L. Zhu, W. Wang, W. Jiang, and R.C. Qiu, "Secure Federated Learning Model Verification: A Client-side Backdoor Triggered Watermarking Scheme," IEEE Trans. Dependable Secure Comput., vol. 20, no. 5, pp. 1802–1815, 2022
A. N. Bhagoji, S. Chakraborty, P. Suresh, and D. Prehofer, "WAFFLE: Towards Practical Watermarking for Federated Learning," IEEE Trans. Mobile Comput., vol. 20, no. 2, pp. 333–346, 2021.
Y. Wu, X. Zhou, D. He, Z. Li, X. Wang, M. Li, and Y. Dai, "WMDefense: Using Watermark to Defense Byzantine Attacks in Federated Learning," IEEE Internet of Things J., vol. 10, no. 12, pp. 11093–11104, Dec. 2023.
Component 2 : �HydraGuard: Backdoor immunity in FL Environments.
J.P.A.S.Pathmendre – IT21085376
BACKGROUND
01
J.P.A.S.Pathmendre – IT21085376
BACKGROUND
J.P.A.S.Pathmendre – IT21085376
RESEARCH PROBLEM
02
J.P.A.S.Pathmendre – IT21085376
RESEARCH PROBLEM
J.P.A.S.Pathmendre – IT21085376
RESEARCH GAP
03
J.P.A.S.Pathmendre – IT21085376
RESEARCH GAP
Zhang, K., Tao, G., Xu, Q., Cheng, S., An, S., Liu, Y., Feng, S., Shen, G., Chen, P.Y., Ma, S. and Zhang, X., 2022. Flip: A provable defense framework for backdoor mitigation in federated learning. arXiv preprint arXiv:2210.12873.
J.P.A.S.Pathmendre – IT21085376
RESEARCH GAP
J.P.A.S.Pathmendre – IT21085376
OBJECTIVES
04
J.P.A.S.Pathmendre – IT21085376
OBJECTIVE
Developing a robust preventive and detective mechanism against backdoor attacks in FL systems without Reducing accuracy lost or without computational overhead.
J.P.A.S.Pathmendre – IT21085376
SUB OBJECTIVE
J.P.A.S.Pathmendre – IT21085376
Literature Review
05
J.P.A.S.Pathmendre – IT21085376
Literature Review
J.P.A.S.Pathmendre – IT21085376
Literature Review
J.P.A.S.Pathmendre – IT21085376
NOVELTY
06
J.P.A.S.Pathmendre – IT21085376
NOVELTY
Componenet Digram
Requirments
J.P.A.S.Pathmendre – IT21085376
Component Diagram
J.P.A.S.Pathmendre – IT21085376
REQUIREMENTS
07
J.P.A.S.Pathmendre – IT21085376
REQUIREMENTS
Non-Funtional
Funtional
Trigger Inversion
Reinitializing Linear Classifier
Measure Class Distance
DATA Set-CIFAR10,MNIST
Fashion-Mnist
Maintain ACC and reducing ASR
Reduce Computational Overhead
Maintaining Model Accuracy
Project Completion
08
J.P.A.S.Pathmendre – IT21085376
65%
J.P.A.S.Pathmendre – IT21085376
Resource Collection
J.P.A.S.Pathmendre – IT21085376
Connecting With Senior Researchers
Connecting With Industry Experts
Work Done Model
J.P.A.S.Pathmendre – IT21085376
Model Training Phase
Getting Results
Work Done Model
J.P.A.S.Pathmendre – IT21085376
When Poisoning
When Triger Inversion
Challenges
09
J.P.A.S.Pathmendre – IT21085376
J.P.A.S.Pathmendre – IT21085376
Future Work
05
J.P.A.S.Pathmendre – IT21085376
J.P.A.S.Pathmendre – IT21085376
REFERENCES
07
J.P.A.S.Pathmendre – IT21085376
REFERENCES
J.P.A.S.Pathmendre – IT21085376
ATHAUDA A.M.I.R.B�IT21049354�CYBER SECURITY
COMPONENT 3�
Athauda A.M.I.R.B – IT21049354
SECUNID:
Enhancing Global Model Security
R24-053
01
TABLE OF CONTENTS
02
03
04
Background
Research Problem
Research Gap
Objectives
05
Methodology
06
Evidence of Completion
07
References
Athauda A.M.I.R.B – IT21049354
R24-053
BACKGROUND
01
Athauda A.M.I.R.B – IT21049354
R24-053
Athauda A.M.I.R.B – IT21049354
R24-053
RESEARCH PROBLEM?
02
Athauda A.M.I.R.B – IT21049354
R24-053
2.Examing local datasets(compromise the privacy of participants)
3.Assuming IID data
Athauda A.M.I.R.B – IT21049354
R24-053
RESEARCH GAP
03
Athauda A.M.I.R.B – IT21049354
R24-053
Athauda A.M.I.R.B – IT21049354
R24-053
| RESEARCH A | RESEARCH B | RESEARCH C | PROPOSED SOLUTION |
Robust outlier detection for security | | | | |
Efficient handling of Non-IID data | | | | |
Integrated approach for FL security & Non-IID data | | | | |
Scalability to large FL network | | | | |
Real world applicability across diverse domains | | | | |
Adherence to Data Privacy Regulations | | | | |
User-friendly system deployment | | | | |
No special insfracture requirements | | | | |
OBJECTIVES
04
Athauda A.M.I.R.B – IT21049354
R24-053
Main Objectives
Sub Objectives
Athauda A.M.I.R.B – IT21049354
R24-053
METHODOLOGY
05
Athauda A.M.I.R.B – IT21049354
R24-053
SECUNID
Athauda A.M.I.R.B – IT21049354
R24-053
EVIDENCE OF COMPLETION
06
Athauda A.M.I.R.B – IT21049354
R24-053
Athauda A.M.I.R.B – IT21049354
R24-053
Github Code for CIFAR Dataset
Athauda A.M.I.R.B – IT21049354
R24-053
Accuracy Results for Byzantine attack CIFAR Dataset
Athauda A.M.I.R.B – IT21049354
R24-053
Accuracy Results for Byzantine attack CIFAR Dataset with median method
Athauda A.M.I.R.B – IT21049354
R24-053
Accuracy Results for Byzantine attack CIFAR Dataset after implementing SECUNID
Athauda A.M.I.R.B – IT21049354
R24-053
REFERENCES
07
Athauda A.M.I.R.B – IT21049354
R24-053
[1] E. Isik-Polat, G. Polat, and A. Kocyigit, “ARFED: Attack-Resistant Federated averaging based on outlier elimination,” Future Generation Computer Systems, vol. 141, pp. 626–650, Apr. 2023, doi: https://doi.org/10.1016/j.future.2022.12.003.
[2] H. Zhang, Y. Zhang, X. Que, Y. Liang, and J. Crowcroft, “Efficient federated learning under non-IID conditions with attackers,” Oct. 2022, doi: https://doi.org/10.1145/3556557.3557951.
[3] D. Panagoda, C. Malinda, C. Wijetunga, L. Rupasinghe, B. Bandara, and C. Liyanapathirana, “Application of Federated Learning in Health Care Sector for Malware Detection and Mitigation Using Software Defined Networking Approach,” IEEE Xplore, Aug. 01, 2022. https://ieeexplore.ieee.org/document/9909488 (accessed Jun. 10, 2023).
[4] C. Zhou, Y. Sun, D. Wang, and Q. Gao, “Fed-Fi: Federated Learning Malicious Model Detection Method Based on Feature Importance,” Security and Communication Networks, vol. 2022, pp. 1–11, May 2022, doi: https://doi.org/10.1155/2022/7268347.
[5] Z. Zhang, X. Cao, J. Jia, and N. Z. Gong, “FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients,” Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Aug. 2022, doi: https://doi.org/10.1145/3534678.3539231.
Athauda A.M.I.R.B – IT21049354
R24-053
Athauda A.M.I.R.B – IT21049354
R24-053
Thanks!
A.R.W.M.V.Hasaranga�IT21051548
Table of Contents
Photo by rupixen.com on Unsplash
Background
Photo by Shubham Dhage on Unsplash
Research Problems
Photo by Sharad Bhat on Unsplash
Research Gap
Photo by Yoel Peterson on Unsplash
Research Gap
Novelty of the Approach
Photo by Adi Goldstein on Unsplash
Component Diagram
Objectives and Sub-objectives
Photo by rafaela pimentel on Unsplash
Functional and Non-functional Requirements
Photo by ThisisEngineering RAEng on Unsplash
Research Progress
Photo by DeepMind on Unsplash
Research Progress
Direct label inference attack
Trained model
Active label inference attack
Passive label inference attack
Future works
Photo by Sharad Bhat on Unsplash
References
Photo by Mari Helin on Unsplash
Questions & Discussion
Photo by drmakete lab on Unsplash
Commercialization
TECHNOLOGIES
PYTHON
docker
ML
PyTorch
GITHUB
TensorFlow
Jupyter Notebook
WORK�BREAKDOWN�STRUCTURE
Gantt chart
Thank
YOU