More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

Conference Paper (2022)
Author(s)

J. Xu (TU Delft - Cyber Security)

R. Wang (TU Delft - Cyber Security)

S. Koffas (TU Delft - Cyber Security)

K. Liang (TU Delft - Cyber Security)

S. Picek (TU Delft - Cyber Security, Radboud Universiteit Nijmegen)

Research Group
Cyber Security
Copyright
© 2022 J. Xu, R. Wang, S. Koffas, K. Liang, S. Picek
DOI related publication
https://doi.org/10.1145/3564625.3567999
More Info
expand_more
Publication Year
2022
Language
English
Copyright
© 2022 J. Xu, R. Wang, S. Koffas, K. Liang, S. Picek
Research Group
Cyber Security
Pages (from-to)
684–698
ISBN (electronic)
978-1-4503-9759-9
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Graph Neural Networks (GNNs) are a class of deep learning-based methods for processing graph domain information. GNNs have recently become a widely used graph analysis method due to their superior ability to learn representations for complex graph data. Due to privacy concerns and regulation restrictions, centralized GNNs can be difficult to apply to data-sensitive scenarios. Federated learning (FL) is an emerging technology developed for privacy-preserving settings when several parties need to train a shared global model collaboratively. Although several research works have applied FL to train GNNs (Federated GNNs), there is no research on their robustness to backdoor attacks.

This paper bridges this gap by conducting two types of backdoor attacks in Federated GNNs: centralized backdoor attacks (CBA) and distributed backdoor attacks (DBA). Our experiments show that the DBA attack success rate is higher than CBA in almost all cases. For CBA, the attack success rate of all local triggers is similar to the global trigger, even if the training set of the adversarial party is embedded with the global trigger. To explore the properties of two backdoor attacks in Federated GNNs, we evaluate the attack performance for a different number of clients, trigger sizes, poisoning intensities, and trigger densities. Finally, we explore the robustness of DBA and CBA against two state-of-the-art defenses. We find that both attacks are robust against the investigated defenses, necessitating the need to consider backdoor attacks in Federated GNNs as a novel threat that requires custom defenses.