Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2023

01-12-2023

Protection of Computational Machine Learning Models against Extraction Threat

Authors: M. O. Kalinin, M. D. Soshnev, A. S. Konoplev

Published in: Automatic Control and Computer Sciences | Issue 8/2023

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational machine learning models are based on the use of a protective noise mechanism. The main disadvantage inherent in the noise mechanism is that it reduces the precision of the model’s output. The requirements for the efficient methods of protecting the machine learning models from extraction are formulated, and a new method of defense against this threat, supplementing the noise with a distillation mechanism, is presented. It is experimentally shown that the developed method provides the resistance of machine learning models to extraction threat while maintaining the quality their operating results due to the transformation of protected models into the other simplified models equivalent to the original ones.
Literature
1.
go back to reference Machine Learning as a Service Market: Global Industry Analysis, Size, Share, Growth, Trends, Regional Outlook, and Forecast 2022-2030, 2023. https://www.precedenceresearch.com/machine-learning-as-a-service-market. Cited July 5, 2023. Machine Learning as a Service Market: Global Industry Analysis, Size, Share, Growth, Trends, Regional Outlook, and Forecast 2022-2030, 2023. https://​www.​precedenceresear​ch.​com/​machine-learning-as-a-service-market.​ Cited July 5, 2023.
2.
go back to reference Data base of information security threats. https://bdu.fstec.ru/threat. Cited July 5, 2023. Data base of information security threats. https://​bdu.​fstec.​ru/​threat.​ Cited July 5, 2023.
6.
go back to reference Chandrasekaran, V., Chaudhuri, K., Giacomelli, I., Jha, S., and Yan, S., Exploring connections between active learning and model extraction, Proc. 29th USENIX Conf. on Security Symp., USENIX Association, 2020, pp. 1309–1326. https://www.usenix.org/conference/usenixsecurity20/presentation/chandrasekaran. Chandrasekaran, V., Chaudhuri, K., Giacomelli, I., Jha, S., and Yan, S., Exploring connections between active learning and model extraction, Proc. 29th USENIX Conf. on Security Symp., USENIX Association, 2020, pp. 1309–1326. https://​www.​usenix.​org/​conference/​usenixsecurity20​/​presentation/​chandrasekaran.​
7.
go back to reference Moosavi-Dezfooli, S.-M., Fawzi, A., and Frossard, P., DeepFool: A simple and accurate method to fool deep neural networks, 2016 IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), Las Vegas, 2016, IEEE, 2016, pp. 2574–2582. https://doi.org/10.1109/cvpr.2016.282 Moosavi-Dezfooli, S.-M., Fawzi, A., and Frossard, P., DeepFool: A simple and accurate method to fool deep neural networks, 2016 IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), Las Vegas, 2016, IEEE, 2016, pp. 2574–2582. https://​doi.​org/​10.​1109/​cvpr.​2016.​282
8.
go back to reference The CW attack algorithm. https://wiki.spencerwoo.com/cw-algorithm.html. Cited July 5, 2023. The CW attack algorithm. https://​wiki.​spencerwoo.​com/​cw-algorithm.​html.​ Cited July 5, 2023.
9.
go back to reference Adversarial machine learning. https://www.javatpoint.com/adversarial-machine-learning. Cited July 5, 2023. Adversarial machine learning. https://​www.​javatpoint.​com/​adversarial-machine-learning.​ Cited July 5, 2023.
10.
go back to reference Kleinings, H., What is data extraction? [Techniques, Tools + Use Cases], 2022. levity.ai/blog/what-is-data-extraction. Cited July 5, 2023. Kleinings, H., What is data extraction? [Techniques, Tools + Use Cases], 2022. levity.ai/blog/what-is-data-extraction. Cited July 5, 2023.
11.
go back to reference Tramèr, F., Zhang, F., Juels, A., Reiter, M.K., and Ristenpart, T., Stealing machine learning models via prediction APIs, 25th USENIX Security Symp., Austin, TX: USENIX Association, 2016, pp. 601–618. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer. Tramèr, F., Zhang, F., Juels, A., Reiter, M.K., and Ristenpart, T., Stealing machine learning models via prediction APIs, 25th USENIX Security Symp., Austin, TX: USENIX Association, 2016, pp. 601–618. https://​www.​usenix.​org/​conference/​usenixsecurity16​/​technical-sessions/​presentation/​tramer.​
12.
13.
go back to reference Wiegreffe, S. and Pinter, Yu., Attention is not not explanation, Proc. 2019 Conf. on Empirical Methods in Natural Language Processing and the 9th Int. Joint Conf. on Natural Language Processing (EMNLP-IJCNLP), Inui, K., Jiang, J., Ng, V., and Wan, X., Eds., Hong Kong: Association for Computational Linguistics, 2019, pp. 11–20. https://doi.org/10.18653/v1/D19-1002 Wiegreffe, S. and Pinter, Yu., Attention is not not explanation, Proc. 2019 Conf. on Empirical Methods in Natural Language Processing and the 9th Int. Joint Conf. on Natural Language Processing (EMNLP-IJCNLP), Inui, K., Jiang, J., Ng, V., and Wan, X., Eds., Hong Kong: Association for Computational Linguistics, 2019, pp. 11–20. https://​doi.​org/​10.​18653/​v1/​D19-1002
15.
go back to reference Zhang, Z., Chen, Yi., and Wagner, D., SEAT: Similarity encoder by adversarial training for detecting model extraction attack queries, Proc. 14th ACM Workshop on Artificial Intelligence and Security, New York: Association for Computing Machinery, 2021, pp. 37–48. https://doi.org/10.1145/3474369.3486863 Zhang, Z., Chen, Yi., and Wagner, D., SEAT: Similarity encoder by adversarial training for detecting model extraction attack queries, Proc. 14th ACM Workshop on Artificial Intelligence and Security, New York: Association for Computing Machinery, 2021, pp. 37–48. https://​doi.​org/​10.​1145/​3474369.​3486863
17.
go back to reference Krishna, K., Tomar, G.S., Parikh, A.P., Papernot, N., and Iyyer, M., Thieves on sesame street! Model extraction of BERT-based APIs, 2020. https://openreview.net/forum?id=Byl5NREFDr. Krishna, K., Tomar, G.S., Parikh, A.P., Papernot, N., and Iyyer, M., Thieves on sesame street! Model extraction of BERT-based APIs, 2020. https://​openreview.​net/​forum?​id=​Byl5NREFDr.​
19.
22.
go back to reference Dziedzic, A., Kaleem, M.A., Lu, Yu.Sh., and Papernot, N., Increasing the cost of model extraction with calibrated proof of work, Int. Conf. on Learning Representations, 2022. https://openreview.net/forum?id=EAy7C1cgE1L. Dziedzic, A., Kaleem, M.A., Lu, Yu.Sh., and Papernot, N., Increasing the cost of model extraction with calibrated proof of work, Int. Conf. on Learning Representations, 2022. https://​openreview.​net/​forum?​id=​EAy7C1cgE1L.​
28.
go back to reference Lendave, V., A beginner’s guide to knowledge distillation in deep learning, Analytics India Mag., 2022. https://analyticsindiamag.com/a-beginners-guide-to-knowledge-distillation-in-deep-learning/. Lendave, V., A beginner’s guide to knowledge distillation in deep learning, Analytics India Mag., 2022. https://​analyticsindiama​g.​com/​a-beginners-guide-to-knowledge-distillation-in-deep-learning/​.​
29.
go back to reference Kotak, J. and Elovici, Yu., IoT device identification using deep learning, 13th Int. Conf. on Computational Intelligence in Security for Information Systems (CISIS 2020), Herrero, Á., Cambra, C., Urda, D., Sedano, J., Quintián, H., and Corchado, E., Eds., Advances in Intelligent Systems and Computing, vol. 1267, Cham: Springer, 2021, pp. 76–86. https://doi.org/10.1007/978-3-030-57805-3_8 Kotak, J. and Elovici, Yu., IoT device identification using deep learning, 13th Int. Conf. on Computational Intelligence in Security for Information Systems (CISIS 2020), Herrero, Á., Cambra, C., Urda, D., Sedano, J., Quintián, H., and Corchado, E., Eds., Advances in Intelligent Systems and Computing, vol. 1267, Cham: Springer, 2021, pp. 76–86. https://​doi.​org/​10.​1007/​978-3-030-57805-3_​8
30.
go back to reference Meidan, Ya., Bohadana, M., Shabtai, A., Guarnizo, J.D., Ochoa, M., Tippenhauer, N.O., and Elovici, Yu., ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis, Proc. Symp. on Applied Computing, Marrakech, Morocco, 2017, New York: Association for Computing Machinery, 2017, pp. 506–509. https://doi.org/10.1145/3019612.3019878 Meidan, Ya., Bohadana, M., Shabtai, A., Guarnizo, J.D., Ochoa, M., Tippenhauer, N.O., and Elovici, Yu., ProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis, Proc. Symp. on Applied Computing, Marrakech, Morocco, 2017, New York: Association for Computing Machinery, 2017, pp. 506–509. https://​doi.​org/​10.​1145/​3019612.​3019878
Metadata
Title
Protection of Computational Machine Learning Models against Extraction Threat
Authors
M. O. Kalinin
M. D. Soshnev
A. S. Konoplev
Publication date
01-12-2023
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2023
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411623080084

Other articles of this Issue 8/2023

Automatic Control and Computer Sciences 8/2023 Go to the issue