skip to main content
10.1145/3583678.3603282acmconferencesArticle/Chapter ViewAbstractPublication PagesdebsConference Proceedingsconference-collections
poster

Poster: StreamToxWatch – Data Poisoning Detector in Distributed, Event-based Environments

Published:27 June 2023Publication History

ABSTRACT

StreamToxWatch, or ToxWatch for short, is an early-stage ensemble architecture for data poisoning detection and monitoring in online learning systems over streams. Detecting data poisoning is difficult, especially in distributed streaming systems where statistical baselines change on the fly and across the system. For that reason, ToxWatch employs a combination of input, (adversarial) conceptual drift, and model performance monitors intended to observe anomalous behaviors and phenomena across the system and to offer targeted detection signals to downstream applications.

References

  1. Subutai Ahmad, Alexander Lavin, Scott Purdy, and Zuha Agha. 2017. Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262 (2017), 134--147.Google ScholarGoogle ScholarCross RefCross Ref
  2. Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen, and Qian Wang. 2021. Recent advances in adversarial training for adversarial robustness. arXiv preprint arXiv:2102.01356 (2021).Google ScholarGoogle Scholar
  3. Indradumna Banerjee, Dinesh Ghanta, Girish Nautiyal, Pradeep Sanchana, Prateek Katageri, and Atin Modi. 2023. MLOps with enhanced performance control and observability. arXiv preprint arXiv:2302.01061 (2023).Google ScholarGoogle Scholar
  4. Edmon Begoli. 2023. StreamToxWatch. Google ScholarGoogle ScholarCross RefCross Ref
  5. Andrey Besedin, Pierre Blanchart, Michel Crucianu, and Marin Ferecatu. 2017. Evolutive deep models for online learning on data streams with no storage. In ECML/PKDD 2017 Workshop on Large-scale Learning from Data Streams in Evolving Environments.Google ScholarGoogle Scholar
  6. Nicholas Carlini and David Wagner. 2017. Adversarial examples are not easily detected: Bypassing ten detection methods. In Proceedings of the 10th ACM workshop on artificial intelligence and security. 3--14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jiaxin Fan, Qi Yan, Mohan Li, Guanqun Qu, and Yang Xiao. 2022. A Survey on Data Poisoning Attacks and Defenses. In 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC). IEEE, 48--55.Google ScholarGoogle ScholarCross RefCross Ref
  8. Ranwa Al Mallah, David Lopez, Godwin Badu Marfo, and Bilal Farooq. 2021. Untargeted poisoning attack detection in federated learning via behavior attestation. arXiv preprint arXiv:2101.10904 (2021).Google ScholarGoogle Scholar
  9. Sanjay Seetharaman, Shubham Malaviya, Rosni Vasu, Manish Shukla, and Sachin Lodha. 2022. Influence based defense against data poisoning attacks in online learning. In 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  10. Tegjyot Singh Sethi and Mehmed Kantardzic. 2018. Handling adversarial concept drift in streaming data. Expert systems with applications 97 (2018), 18--40.Google ScholarGoogle Scholar
  11. Jacob Steinhardt, Pang Wei W Koh, and Percy S Liang. 2017. Certified defenses for data poisoning attacks. Advances in neural information processing systems 30 (2017).Google ScholarGoogle Scholar
  12. Ioannis Tzanettis, Christina-Maria Androna, Anastasios Zafeiropoulos, Eleni Fotopoulou, and Symeon Papavassiliou. 2022. Data Fusion of Observability Signals for Assisting Orchestration of Distributed Applications. Sensors 22, 5 (2022), 2061.Google ScholarGoogle ScholarCross RefCross Ref
  13. Shenghui Wang, Stefan Schlobach, and Michel Klein. 2011. Concept drift and how to identify it. Journal of Web Semantics 9, 3 (2011), 247--265.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Zicheng Wang. 2021. Can "micro VM" become the next generation computing platform?: Performance comparison between light weight Virtual Machine, container, and traditional Virtual Machine. In 2021 IEEE International Conference on Computer Science, Artificial Intelligence and Electronic Engineering (CSAIEE). IEEE, 29--34.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Poster: StreamToxWatch – Data Poisoning Detector in Distributed, Event-based Environments

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      DEBS '23: Proceedings of the 17th ACM International Conference on Distributed and Event-based Systems
      June 2023
      221 pages
      ISBN:9798400701221
      DOI:10.1145/3583678

      Copyright © 2023 Owner/Author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 June 2023

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate130of553submissions,24%

      Upcoming Conference

      DEBS '24
    • Article Metrics

      • Downloads (Last 12 months)26
      • Downloads (Last 6 weeks)5

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader