Create a membership inference attack
Overview
A membership inference attack enables you to evaluate the security of a Driverless AI model (experiment) on grounds of a membership inference attack.
Instructions
To create a membership inference attack, consider the following instructions:
- Run a model inversion attack. Note
To learn how to run a model inversion attack, see Create a model inversion attack.
- Click Run membership inference.
- Click Browse.... Or drag and drop the file (membership inference training dataset).Note
- Recall: After executing a model inversion attack, the surrogate model created in such an attack is used to create a second-level surrogate model. This second-level surrogate model is trained to discriminate between rows of data in and not in the first-level surrogate training data. As a result, the second-level surrogate model can indicate whether a training row was in the original model's training data.
- The format of the membership inference training dataset is as follows: A
.csv
file containing the following columns:- Columns representing the required features the endpoint URL needs to score new data
- You need to populate these columns with the training information (rows) of the first-level surrogate model
- To access the data (rows), the first-level surrogate model used for training, consider the following intruction:
- Click Download simulated training data (a
.csv
file its downloaded)
- Click Download simulated training data (a
- To access the data (rows), the first-level surrogate model used for training, consider the following intruction:
- You need to populate these columns with the training information (rows) of the first-level surrogate model
- A column name
in_train
that needs to refer to whether H2O Model Security used the data in a row to train the first-level surrogate model- If H2O Model Security did not utilize a row as training data for the first-level surrogate model, assigned the column a value of 0, a 1 otherwise (if it was in the trianing dataset)
- To access the data (rows), the first-level surrogate model used for training, consider the following intruction:
- Click Download simulated training data (a
.csv
file its downloaded)
- Click Download simulated training data (a
- To access the data (rows), the first-level surrogate model used for training, consider the following intruction:
- If H2O Model Security did not utilize a row as training data for the first-level surrogate model, assigned the column a value of 0, a 1 otherwise (if it was in the trianing dataset)
- A column name
Performance
that needs to refer to the Adversarial loss the first-level surrogate model attributed to the row (data)- To access the Adversarial loss values H2O Model Security assigned to a particular row, consider the following instructions: Click Download full attack CSV (a
.csv
file its downloaded (the Adversarial loss values are in the Adversarial loss column)NoteTo observe a sample membership inference dataset, see Example membership inference training dataset.
- To access the Adversarial loss values H2O Model Security assigned to a particular row, consider the following instructions: Click Download full attack CSV (a
- Columns representing the required features the endpoint URL needs to score new data
- Click Upload data.
- In the Column sampling rate box, enter a column sampling rate for the second-level surrogate model.
- In the Row sampling rate box, enter a row sampling rate for the second-level surrogate model.
- In the Number of trees (Inference model) box, enter the number of trees for the second-level surrogate model.
- In the Maximum depth (Inference model) box, enter the maximum depth for the second-level surrogate model.
- In the Learning rate (Inference model) box, enter the learning rate for the second-level surrogate model.
- Click Begin inference test on training data.
Note
- To learn about each setting of a membership inference attack, see Settings: Membership inference attack.
- H2O Model Security offers an array of metrics in the form of charts, stats cards, and confusion matrices to understand a completed membership inference attack. To learn more, see Metrics: Membership inference attack.
- To learn about the flow of an attack in H2O Model Security, see Model security flow.
Feedback
- Submit and view feedback for this page
- Send feedback about H2O Model Security to cloud-feedback@h2o.ai