论文标题

尝试避免攻击:用于医疗保健系统系统的联合数据消毒防御

Try to Avoid Attacks: A Federated Data Sanitization Defense for Healthcare IoMT Systems

论文作者

Chen, Chong, Gao, Ying, Shi, Leyu, Huang, Siquan

论文摘要

医疗保健IOMT系统正在变得聪明,微型,并更加融合到日常生活中。至于IOMT中的分布式设备,在满足数据安全性时,联合学习已成为具有基于云的培训程序的主题领域。但是,IOMT的分布有保护免受数据中毒攻击的风险。可以通过伪造医疗数据来制造中毒数据,这敦促对IOMT系统的安全防御。由于缺乏特定标签,恶意数据的过滤是一种独特的无监督场景。主要挑战之一是为各种中毒攻击找到强大的数据过滤方法。本文介绍了联合数据消毒防御,这是一种保护系统免受数据中毒攻击的新方法。为了解决这个无监督的问题,我们首先使用联邦学习将所有数据投射到子空间域,从而可以建立统一的功能映射,因为数据已存储在本地。然后,我们采用联合聚类来重新组合其特征以澄清中毒数据。聚类基于数据及其语义的一致关联。在获得私人数据的聚类之后,我们使用简单但有效的策略进行数据消毒。最后,每个分布式IMOT的设备都可以根据联合数据消毒过滤恶意数据。进行了广泛的实验,以评估提出的防御方法针对数据中毒攻击的疗效。此外,我们考虑了不同的中毒比率的方法,并获得了高准确性和低攻击成功率。

Healthcare IoMT systems are becoming intelligent, miniaturized, and more integrated into daily life. As for the distributed devices in the IoMT, federated learning has become a topical area with cloud-based training procedures when meeting data security. However, the distribution of IoMT has the risk of protection from data poisoning attacks. Poisoned data can be fabricated by falsifying medical data, which urges a security defense to IoMT systems. Due to the lack of specific labels, the filtering of malicious data is a unique unsupervised scenario. One of the main challenges is finding robust data filtering methods for various poisoning attacks. This paper introduces a Federated Data Sanitization Defense, a novel approach to protect the system from data poisoning attacks. To solve this unsupervised problem, we first use federated learning to project all the data to the subspace domain, allowing unified feature mapping to be established since the data is stored locally. Then we adopt the federated clustering to re-group their features to clarify the poisoned data. The clustering is based on the consistent association of data and its semantics. After we get the clustering of the private data, we do the data sanitization with a simple yet efficient strategy. In the end, each device of distributed ImOT is enabled to filter malicious data according to federated data sanitization. Extensive experiments are conducted to evaluate the efficacy of the proposed defense method against data poisoning attacks. Further, we consider our approach in the different poisoning ratios and achieve a high Accuracy and a low attack success rate.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源