arXiv Open Access 2024

PACE: Poisoning Attacks on Learned Cardinality Estimation

Jintao Zhang Chao Zhang Guoliang Li Chengliang Chai
Lihat Sumber

Abstrak

Cardinality estimation (CE) plays a crucial role in database optimizer. We have witnessed the emergence of numerous learned CE models recently which can outperform traditional methods such as histograms and samplings. However, learned models also bring many security risks. For example, a query-driven learned CE model learns a query-to-cardinality mapping based on the historical workload. Such a learned model could be attacked by poisoning queries, which are crafted by malicious attackers and woven into the historical workload, leading to performance degradation of CE. In this paper, we explore the potential security risks in learned CE and study a new problem of poisoning attacks on learned CE in a black-box setting. Experiments show that PACE reduces the accuracy of the learned CE models by 178 times, leading to a 10 times decrease in the end-to-end performance of the target database.

Topik & Kata Kunci

Penulis (4)

J

Jintao Zhang

C

Chao Zhang

G

Guoliang Li

C

Chengliang Chai

Format Sitasi

Zhang, J., Zhang, C., Li, G., Chai, C. (2024). PACE: Poisoning Attacks on Learned Cardinality Estimation. https://arxiv.org/abs/2409.15990

Akses Cepat

Lihat di Sumber
Informasi Jurnal
Tahun Terbit
2024
Bahasa
en
Sumber Database
arXiv
Akses
Open Access ✓