This paper presents Fenics, a comprehensive open-source frame- work for evaluating Decentralized Federated Learning (DFL) net- works in the presence of malicious users. The framework implements core DFL functionalities, including data distribution strategies, dynamic node participation, model aggregation, and attack model simulation, to assess DFL network resilience under various attack scenarios. Phoenix supports multiple communication proto- cols and custom network topologies, providing potential avenues to investigate the impact of malicious nodes based on their placement within the network. To the best of our knowledge, Phoenix is the first fully open-source and modular framework of its kind, allowing diverse topologies and attack scenarios to be easily incorporated. We demonstrate the framework’s capabilities through experimental evaluation using the FashionMNIST dataset for poisoning and delay attacks. Experimental results reveal critical insights into DFL network vulnerabilities. For example, poisoning attacks exhibit topology-dependent impacts, with accuracy dropping by over 55% in certain scenarios, leading to derailed convergence. Conversely, delay attacks significantly degrade computational efficiency by forcing nodes to idle during malicious delays. The framework’s modular architecture, comprehensive visualization capabilities, and scalability make it a lightweight and accessible tool for insightful analysis of DFL network security and further research.
Phoenix: A Modular Framework for Security Evaluation in Decentralized Federated Learning / Saha, Shubham; Nawrin Nova, Sifat; Duvignau, Romaric; Chiasserini, Carla Fabiana. - (2025). (Intervento presentato al convegno DEBS 2025 19TH ACM INTERNATIONAL CONFERENCE ON DISTRIBUTED AND EVENT-BASED SYSTEMS tenutosi a Gothenburg (Swe) nel 10–13 June 2025).
Phoenix: A Modular Framework for Security Evaluation in Decentralized Federated Learning
Carla Fabiana Chiasserini
2025
Abstract
This paper presents Fenics, a comprehensive open-source frame- work for evaluating Decentralized Federated Learning (DFL) net- works in the presence of malicious users. The framework implements core DFL functionalities, including data distribution strategies, dynamic node participation, model aggregation, and attack model simulation, to assess DFL network resilience under various attack scenarios. Phoenix supports multiple communication proto- cols and custom network topologies, providing potential avenues to investigate the impact of malicious nodes based on their placement within the network. To the best of our knowledge, Phoenix is the first fully open-source and modular framework of its kind, allowing diverse topologies and attack scenarios to be easily incorporated. We demonstrate the framework’s capabilities through experimental evaluation using the FashionMNIST dataset for poisoning and delay attacks. Experimental results reveal critical insights into DFL network vulnerabilities. For example, poisoning attacks exhibit topology-dependent impacts, with accuracy dropping by over 55% in certain scenarios, leading to derailed convergence. Conversely, delay attacks significantly degrade computational efficiency by forcing nodes to idle during malicious delays. The framework’s modular architecture, comprehensive visualization capabilities, and scalability make it a lightweight and accessible tool for insightful analysis of DFL network security and further research.File | Dimensione | Formato | |
---|---|---|---|
DEBS2025_PaperID-34_Phoenix.pdf
accesso aperto
Tipologia:
1. Preprint / submitted version [pre- review]
Licenza:
Pubblico - Tutti i diritti riservati
Dimensione
579.04 kB
Formato
Adobe PDF
|
579.04 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2998921