Artificial Intelligence Security: Threats and Countermeasures

被引:45
|
作者
Hu, Yupeng [1 ]
Kuang, Wenxin [1 ]
Qin, Zheng [1 ]
Li, Kenli [1 ]
Zhang, Jiliang [1 ]
Gao, Yansong [2 ]
Li, Wenjia [3 ]
Li, Keqin [4 ]
机构
[1] Hunan Univ, Changsha 410082, Hunan, Peoples R China
[2] Nanjing Univ Sci & Technol, Nanjing 210094, Jiangsu, Peoples R China
[3] New York Inst Technol, New York, NY 10023 USA
[4] SUNY Albany, Albany, NY 12246 USA
基金
中国国家自然科学基金; 湖南省自然科学基金;
关键词
Adversarial example attack; artificial intelligence security; poisoning attack; image scaling attack; data collection related attack; AUTOMATIC SPEECH RECOGNITION; DATA-COLLECTION; NEURAL-NETWORK; ATTACKS; ROBUSTNESS;
D O I
10.1145/3487890
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, with rapid technological advancement in both computing hardware and algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human being in a wide range of fields, such as image recognition, education, autonomous vehicles, finance, and medical diagnosis. However, AI-based systems are generally vulnerable to various security threats throughout the whole process, ranging from the initial data collection and preparation to the training, inference, and final deployment. In an AI-based system, the data collection and pre-processing phase are vulnerable to sensor spoofing attacks and scaling attacks, respectively, while the training and inference phases of the model are subject to poisoning attacks and adversarial attacks, respectively. To address these severe security threats against the AI-based systems, in this article, we review the challenges and recent research advances for security issues in AI, so as to depict an overall blueprint for AI security. More specifically, we first take the lifecycle of an AI-based system as a guide to introduce the security threats that emerge at each stage, which is followed by a detailed summary for corresponding countermeasures. Finally, some of the future challenges and opportunities for the security issues in AI will also be discussed.
引用
收藏
页数:36
相关论文
共 50 条
  • [41] A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis
    Rugo, Alessio
    Ardagna, Claudio A.
    Ioini, Nabil El
    ACM Computing Surveys, 2022, 55 (01):
  • [42] Security threats and countermeasures of MAC layer in cognitive radio networks
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    AD HOC NETWORKS, 2018, 70 : 85 - 102
  • [43] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530
  • [44] Security Challenges for Drone Communications: Possible Threats, Attacks and Countermeasures
    Krichen, Moez
    Adoni, Wilfried Yves Hamilton
    Mihoub, Alaeddine
    Alzahrani, Mohammed Y.
    Nahhal, Tarik
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 184 - 189
  • [45] Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures
    Mawgoud, Ahmed A.
    Taha, Mohamed Hamed N.
    Khalifa, Nour Eldeen M.
    Loey, Mohamed
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2019, 2020, 1058 : 912 - 921
  • [46] Security threats and countermeasures in military 5G systems
    Sliwa, Joanna
    Suchanski, Marek
    2022 24TH INTERNATIONAL MICROWAVE AND RADAR CONFERENCE (MIKON), 2022,
  • [47] Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures
    Rajendran, Gowthamaraj
    Nivash, Ragul R. S.
    Parthy, Purushotham Parthiban
    Balamurugan, S.
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [48] Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures
    Mo, Kanghua
    Ye, Peigen
    Ren, Xiaojun
    Wang, Shaowei
    Li, Wenjun
    Li, Jin
    ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [49] A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)
    Papaioannou, Maria
    Karageorgou, Marina
    Mantas, Georgios
    Sucasas, Victor
    Essop, Ismael
    Rodriguez, Jonathan
    Lymberopoulos, Dimitrios
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06)
  • [50] Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures
    Duan, Li
    Sun, Yangyang
    Zhang, Kejia
    Ding, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022