Adversarial Attacks on Adversarial Bandits

01/30/2023
by   Yuzhe Ma, et al.
0

We study a security threat to adversarial multi-armed bandits, in which an attacker perturbs the loss or reward signal to control the behavior of the victim bandit player. We show that the attacker is able to mislead any no-regret adversarial bandit algorithm into selecting a suboptimal target arm in every but sublinear (T-o(T)) number of rounds, while incurring only sublinear (o(T)) cumulative attack cost. This result implies critical security concern in real-world bandit-based systems, e.g., in online recommendation, an attacker might be able to hijack the recommender system and promote a desired product. Our proposed attack algorithms require knowledge of only the regret rate, thus are agnostic to the concrete bandit algorithm employed by the victim player. We also derived a theoretical lower bound on the cumulative attack cost that any victim-agnostic attack algorithm must incur. The lower bound matches the upper bound achieved by our attack, which shows that our attack is asymptotically optimal.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/21/2020

Near Optimal Adversarial Attack on UCB Bandits

We consider a stochastic multi-arm bandit problem where rewards are subj...
research
05/16/2019

Data Poisoning Attacks on Stochastic Bandits

Stochastic multi-armed bandits form a class of online learning problems ...
research
10/29/2018

Adversarial Attacks on Stochastic Bandits

We study adversarial attacks that manipulate the reward signals to contr...
research
02/19/2020

Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense

Due to the broad range of applications of stochastic multi-armed bandit ...
research
12/13/2022

Towards Efficient and Domain-Agnostic Evasion Attack with High-dimensional Categorical Inputs

Our work targets at searching feasible adversarial perturbation to attac...
research
11/15/2019

Resource-Competitive Sybil Defenses

Proof-of-work(PoW) is an algorithmic tool used to secure networks by imp...
research
12/12/2018

On Distributed Multi-player Multiarmed Bandit Problems in Abruptly Changing Environment

We study the multi-player stochastic multiarmed bandit (MAB) problem in ...

Please sign up or login with your details

Forgot password? Click here to reset