Data Poisoning Attack against Neural Network-Based On-Device Learning Anomaly Detector by Physical Attacks on Sensors
Abstract
:1. Introduction
- We present a data poisoning attack scenario for an on-device learning anomaly detection system with concept drift detection and multiple detection instances.
- We conducted experiments based on the attack scenario outlined above to evaluate the threat. We tampered with the observed data by irradiating the accelerometer with acoustic waves and had the anomaly detection system create an instance using this as training data. We showed that this instance would determine abnormal vibrations as “normal”, making it impossible for the anomaly detection system to determine that abnormal vibrations were abnormal.
2. Preliminaries
2.1. Autoencoder-Based Anomaly Detector
2.2. Concept Drift
2.3. Extreme Learning Machine
2.4. Acoustic Injection Attacks on MEMS Accelerometers
3. Neural Network-Based On-Device Learning Anomaly Detector
3.1. ONLAD
3.2. Multi-Instance
3.3. Concept Drift Detection
3.4. Behavior of Anomaly Detector
4. Threat Model
4.1. Attack Scenario
- Anomaly detector is installed on a factory machine. The anomaly detector measures the vibrations of the machine with a MEMS accelerometer and detects anomalies. Unlike our previous report [9], the anomaly detector in this paper newly adopts a concept drift detection and multi-instance. The addition of these two functions enables the anomaly detector to accommodate multiple normal patterns.
- Victim (user of the anomaly detector) aims to detect abnormal behavior of equipment to be monitored by using an on-device learning anomaly detector. The anomaly detector is installed in the target equipment, and the prediction results, “normal” or “abnormal”, are checked. An accelerometer in the detector observes the vibration of the equipment during its operation. The victim does not check the data acquired by the accelerometer and the anomaly detector’s training status.
- Attacker aims to hide an abnormal behavior of the target equipment from the anomaly detector through a data poisoning attack. To achieve this, the attacker uses an acoustic injection attack to tamper with the accelerometer’s observation. The attacker carefully imitates the abnormal vibrations and trains the anomaly detector on it. The victim is unable to notice this because the acoustic injection attack is not an invasive attack and the acoustic wave cannot be heard by humans when it is in the ultrasonic range.
4.2. Attack Procedure
5. Experimental Setup
6. Acoustic Injection Attack against MEMS Accelerometer
- Experiment to evaluate the effect of the frequency of acoustic waves: A function generator generates signals while sweeping the frequency. The signal is input to a speaker, and the generated acoustic waves are irradiated into an accelerometer. First, a full-range speaker is used to evaluate the effect of injecting audible acoustic waves (2700–3200 Hz). Next, we evaluate the effect of injecting ultrasonic waves (25,300–25,800 Hz) using an ultrasonic speaker. The output voltage of the function generator was set to the maximum allowable voltage of each speaker (P800K: 10 V, CUSA-T601-150-2400-TH: 30 V).
- Experiment to evaluate the effect of sound pressure: The function generator generates signals while sweeping the output voltage. The signal is input to the speaker, and the generated acoustic wave is injected into the accelerometer. The frequency of the injected acoustic waves is set to 3000 Hz with the full-range speaker. The signal voltage input to the speaker is increased from 2 V to 10 V.
7. Data Poisoning Attack against Anomaly Detector
7.1. Frequency Spectrums of Accelerometers in Each Fan State
7.2. Behavior of Anomaly Detector in No-Attack Scenario
7.3. Behavior of Anomaly Detector in Data Poisoning Attack Scenario
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Zhou, Z.; Chen, X.; Li, E.; Zeng, L.; Luo, K.; Zhang, J. Edge Intelligence: Paving the Last Mile of Artificial Intelligence with Edge Computing. Proc. IEEE 2019, 107, 1738–1762. [Google Scholar] [CrossRef]
- Cook, A.A.; Mısırlı, G.; Fan, Z. Anomaly Detection for IoT Time-Series Data: A Survey. IEEE Internet Things J. 2020, 7, 6481–6494. [Google Scholar] [CrossRef]
- Lu, J.; Liu, A.; Dong, F.; Gu, F.; Gama, J.; Zhang, G. Learning under Concept Drift: A Review. IEEE Trans. Knowl. Data Eng. 2018, 31, 2346–2363. [Google Scholar] [CrossRef]
- Tsukada, M.; Kondo, M.; Matsutani, H. A Neural Network-Based On-Device Learning Anomaly Detector for Edge Devices. IEEE Trans. Comput. 2020, 69, 1027–1044. [Google Scholar] [CrossRef]
- Michael, J. Security and Privacy for Edge Artificial Intelligence. IEEE Secur. Priv. 2021, 19, 4–7. [Google Scholar] [CrossRef]
- Steinhardt, J.; Koh, P.W.; Liang, P. Certified Defenses for Data Poisoning Attacks. In Proceedings of the 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA, 4–9 December 2017. [Google Scholar]
- Biggio, B.; Corona, I.; Fumera, G.; Giacinto, G.; Fabio, F. Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks. In Proceedings of the Multiple Classifier Systems, Naples, Italy, 15–17 June 2011; pp. 350–359. [Google Scholar]
- Tian, Z.; Cui, L.; Liang, J.; Yu, S. A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning. ACM Comput. Surv. 2022, 55, 1–35. [Google Scholar] [CrossRef]
- Ino, T.; Yoshida, K.; Matsutani, H.; Fujino, T. A Feasibility Study of Data Poisoning against On-device Learning Edge AI by Physical Attack against Sensors. J. Signal Process. 2024, 28, 107–110. [Google Scholar] [CrossRef]
- Yamada, T.; Matsutani, H. A Lightweight Concept Drift Detection Method for On-Device Learning on Resource-Limited Edge Devices. In Proceedings of the 2023 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), St. Petersburg, FL, USA, 15–19 May 2023; pp. 761–768. [Google Scholar] [CrossRef]
- Kazuki Sunaga, M.K.; Matsutani, H. Addressing the Gap Between Training Data and Deployed Environment by On-Device Learning. IEEE Micro 2023, 43, 66–73. [Google Scholar] [CrossRef]
- Breunig, M.M.; Kriegel, H.P.; Ng, R.T.; Sander, J. LOF: Identifying density-based local outliers. In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA, 16–18 May 2000; pp. 93–104. [Google Scholar]
- Li, K.L.; Huang, H.K.; Tian, S.F.; Xu, W. Improving one-class SVM for anomaly detection. In Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 03EX693), Xi’an, China, 5 November 2003; Volume 5, pp. 3077–3081. [Google Scholar] [CrossRef]
- An, J.; Cho, S. Variational Autoencoder based Anomaly Detection using Reconstruction Probability. Spec. Lect. IE 2015, 2, 1–8. [Google Scholar]
- Hinton, G.E.; Salakhutdinov, R.R. Reducing the Dimensionality of Data with Neural Networks. Science 2006, 313, 504–507. [Google Scholar] [CrossRef]
- Said Elsayed, M.; Le-Khac, N.A.; Dev, S.; Jurcut, A.D. Network Anomaly Detection Using LSTM Based Autoencoder. In Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet ’20), New York, NY, USA, 16–20 November 2020; pp. 37–45. [Google Scholar] [CrossRef]
- Xu, W.; Jang-Jaccard, J.; Singh, A.; Wei, Y.; Sabrina, F. Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset. IEEE Access 2021, 9, 140136–140146. [Google Scholar] [CrossRef]
- Widmer, G.; Kubat, M. Learning in the Presence of Concept Drift and Hidden Contexts. Mach. Learn. 1996, 23, 69–101. [Google Scholar] [CrossRef]
- Yang, L.; Shami, A. A Lightweight Concept Drift Detection and Adaptation Framework for IoT Data Streams. IEEE Internet Things Mag. 2021, 4, 96–101. [Google Scholar] [CrossRef]
- Huang, G.B.; Zhu, Q.Y.; Siew, C.K. Extreme learning machine: A new learning scheme of feedforward neural networks. In Proceedings of the 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No. 04CH37541), Budapest, Hungary, 25–29 July 2004; Volume 2, pp. 985–990. [Google Scholar] [CrossRef]
- Guru Manikandan, K.; Pannirselvam, K.; Kenned, J.J.; Suresh Kumar, C. Investigations on suitability of MEMS based accelerometer for vibration measurements. Mater. Today Proc. 2021, 45, 6183–6192. [Google Scholar] [CrossRef]
- Tsai, J.M.; Sun, I.C.; Chen, K.S. Realization and performance evaluation of a machine tool vibration monitoring module by multiple MEMS accelerometer integrations. Int. J. Adv. Manuf. Technol. 2021, 114, 464–479. [Google Scholar] [CrossRef]
- Trippel, T.; Weisse, O.; Xu, W.; Honeyman, P.; Fu, K. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (Euro S&P), Paris, France, 26–28 April 2017; pp. 3–18. [Google Scholar] [CrossRef]
- Nashimoto, S.; Suzuki, D.; Sugawara, T.; Sakiyama, K. Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security (ASIACCS’18), New York, NY, USA, 4 June 2018; pp. 511–524. [Google Scholar] [CrossRef]
- Wang, J.; Yang, A.; Guo, P.; Lu, C.; Feng, L.; Xing, C. Experimental and Theoretical Study of Acoustic Injection Attacks on MEMS Accelerometer. In Proceedings of the 2019 International Conference on Sensing and Instrumentation in IoT Era (ISSI), Lisbon, Portugal, 29–30 August 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Liang, N.Y.; Huang, G.B.; Saratchandran, P.; Sundararajan, N. A Fast and Accurate Online Sequential Learning Algorithm for Feedforward Networks. IEEE Trans. Neural Netw. 2006, 17, 1411–1423. [Google Scholar] [CrossRef]
- Woźniak, M.; Graña, M.; Corchado, E. A survey of multiple classifier systems as hybrid systems. Inf. Fusion 2014, 16, 3–17. [Google Scholar] [CrossRef]
- Gama, J.; Medas, P.; Castillo, G.; Rodrigues, P. Learning with Drift Detection. In Advances in Artificial Intelligence—SBIA 2004; Springer: Berlin/Heidelberg, Germany, 2004; Volume 8, pp. 286–295. [Google Scholar] [CrossRef]
- Gama, J.A.; Žliobaitundefined, I.; Bifet, A.; Pechenizkiy, M.; Bouchachia, A. A survey on concept drift adaptation. ACM Comput. Surv. (CSUR) 2014, 46, 1–37. [Google Scholar] [CrossRef]
- Baena-García, M.; Campo-Ávila, J.; Fidalgo-Merino, R.; Bifet, A.; Gavald, R.; Morales-Bueno, R. Early Drift Detection Method. In Proceedings of the Fourth International Workshop on Knowledge Discovery from Data Streams, Philadelphia, PA, USA, 20 August 2006; Volume 6, pp. 77–86. [Google Scholar]
- Bifet, A.; Gavaldà, R. Learning from Time-Changing Data with Adaptive Windowing. In Proceedings of the 2007 SIAM International Conference on Data Mining, Minneapolis, MN, USA, 26–28 April 2007; Volume 7. [Google Scholar] [CrossRef]
- Matsui, A.; Asahi, S.; Tamura, S.; Hayamizu, S.; Isashi, R.; Furukawa, A.; Naitou, T. Anomaly Detection in Mechanical Vibration Using Combination of Signal Processing and Autoencoder. J. Signal Process. 2020, 24, 203–206. [Google Scholar] [CrossRef]
- Baek, S.; Yoon, H.S.; Kim, D.Y. Abnormal vibration detection in the bearing-shaft system via semi-supervised classification of accelerometer signal patterns. Procedia Manuf. 2020, 51, 316–323. [Google Scholar] [CrossRef]
- Jaber, A.A. Diagnosis of bearing faults using temporal vibration signals: A comparative study of machine learning models with feature selection techniques. J. Fail. Anal. Prev. 2024, 24, 752–768. [Google Scholar] [CrossRef]
Equipment | Model Number | Manufacturer |
---|---|---|
Function generator (in Section 6) | MFG-2260MRA | TEXIO TECHNOLOGY Corp. (Yokohama, Japan) |
Function generator (in Section 7) | FG-281 | JVCKENWOOD Corp. (Yokohama, Japan) |
Audio amplifier | PMA-600NE | D&M Holdings Inc. (Kawasaki, Japan) |
Full-range speaker | P800K | Foster Electric Co. (Akishima, Japan) |
Ultrasonic transmitter | CUSA-T601-150-2400-TH | CUI Devices (Lake Oswego, OR, US) |
Accelerometer | ADXL345 | Analog Devices, Inc. (Wilmington, MA, US) |
Controller (in Section 6) | Raspberry Pi Pico | Raspberry Pi Foundation (Cambridge, England) |
Controller (in Section 7) | Raspberry Pi 4 Model B | Raspberry Pi Foundation (Cambridge, England) |
Cooling fan | CFZ-120F | Ainex Co. (Higashifushimi, Japan) |
Power supply | P4K-80L | Matsusada Precision Inc. (Kusatsu, Japan) |
Parameter | Value |
---|---|
No. of input/output layer nodes | 800 |
No. of hidden layer nodes | 10 |
Activation | Sigmoid |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ino, T.; Yoshida, K.; Matsutani, H.; Fujino, T. Data Poisoning Attack against Neural Network-Based On-Device Learning Anomaly Detector by Physical Attacks on Sensors. Sensors 2024, 24, 6416. https://doi.org/10.3390/s24196416
Ino T, Yoshida K, Matsutani H, Fujino T. Data Poisoning Attack against Neural Network-Based On-Device Learning Anomaly Detector by Physical Attacks on Sensors. Sensors. 2024; 24(19):6416. https://doi.org/10.3390/s24196416
Chicago/Turabian StyleIno, Takahito, Kota Yoshida, Hiroki Matsutani, and Takeshi Fujino. 2024. "Data Poisoning Attack against Neural Network-Based On-Device Learning Anomaly Detector by Physical Attacks on Sensors" Sensors 24, no. 19: 6416. https://doi.org/10.3390/s24196416
APA StyleIno, T., Yoshida, K., Matsutani, H., & Fujino, T. (2024). Data Poisoning Attack against Neural Network-Based On-Device Learning Anomaly Detector by Physical Attacks on Sensors. Sensors, 24(19), 6416. https://doi.org/10.3390/s24196416