Machine Learning Security: Threats, Countermeasures, and Evaluations

被引:89
|
作者
Xue, Mingfu [1 ]
Yuan, Chengxiang [1 ]
Wu, Heyi [2 ]
Zhang, Yushu [1 ]
Liu, Weiqiang [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Nanjing Upsec Network Secur Technol Res Inst Co L, Nanjing 211100, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210016, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Machine learning; Security; Data models; Machine learning algorithms; Training; Training data; Prediction algorithms; Artificial intelligence security; poisoning attacks; backdoor attacks; adversarial examples; privacy-preserving machine learning; POISONING ATTACKS; DEFENSES;
D O I
10.1109/ACCESS.2020.2987435
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing with various complex problems, and shows capabilities close to humans or even beyond humans. However, recent studies show that machine learning models are vulnerable to various attacks, which will compromise the security of the models themselves and the application systems. Moreover, such attacks are stealthy due to the unexplained nature of the deep learning models. In this survey, we systematically analyze the security issues of machine learning, focusing on existing attacks on machine learning systems, corresponding defenses or secure learning techniques, and security evaluation methods. Instead of focusing on one stage or one type of attack, this paper covers all the aspects of machine learning security from the training phase to the test phase. First, the machine learning model in the presence of adversaries is presented, and the reasons why machine learning can be attacked are analyzed. Then, the machine learning security-related issues are classified into five categories: training set poisoning; backdoors in the training set; adversarial example attacks; model theft; recovery of sensitive training data. The threat models, attack approaches, and defense techniques are analyzed systematically. To demonstrate that these threats are real concerns in the physical world, we also reviewed the attacks in real-world conditions. Several suggestions on security evaluations of machine learning systems are also provided. Last, future directions for machine learning security are also presented.
引用
收藏
页码:74720 / 74742
页数:23
相关论文
共 50 条
  • [1] Machine learning security and privacy: a review of threats and countermeasures
    Paracha, Anum
    Arshad, Junaid
    Farah, Mohamed Ben
    Ismail, Khalid
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01)
  • [2] Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
    Waheed, Nazar
    He, Xiangjian
    Ikram, Muhammad
    Usman, Muhammad
    Hashmi, Saad Sajid
    ACM COMPUTING SURVEYS, 2021, 53 (06)
  • [3] Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)
    Haji Mirzaee, Parya
    Shojafar, Mohammad
    Cruickshank, Haitham
    Tafazolli, Rahim
    IEEE ACCESS, 2022, 10 : 52922 - 52954
  • [4] Security threats and countermeasures in WLAN
    Nagamalai, D
    Dhinakaran, BC
    Sasikala, P
    Lee, SH
    Lee, JK
    TECHNOLOGIES FOR ADVANCED HETEROGENEOUS NETWORKS, PROCEEDINGS, 2005, 3837 : 168 - 182
  • [5] Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures
    Mo, Kanghua
    Ye, Peigen
    Ren, Xiaojun
    Wang, Shaowei
    Li, Wenjun
    Li, Jin
    ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [6] Economic Security: New Threats and Countermeasures
    Tsiklauri, Viktoria
    Tkacheva, Elizabeth
    Piyaltsev, Alexander
    Ukrainceva, Irina
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 9528 - 9537
  • [7] Artificial Intelligence Security: Threats and Countermeasures
    Hu, Yupeng
    Kuang, Wenxin
    Qin, Zheng
    Li, Kenli
    Zhang, Jiliang
    Gao, Yansong
    Li, Wenjia
    Li, Keqin
    ACM COMPUTING SURVEYS, 2023, 55 (01)
  • [8] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [9] Artificial Intelligence Security: Threats and Countermeasures
    Hu, Yupeng
    Kuang, Wenxin
    Qin, Zheng
    Li, Kenli
    Zhang, Jiliang
    Gao, Yansong
    Li, Wenjia
    Li, Keqin
    ACM Computing Surveys, 2021, 55 (01)
  • [10] Wireless network security: Vulnerabilities, threats and countermeasures
    Choi, Min-Kyu
    Robles, Rosslin John
    Hong, Chang-Hwa
    Kim, Tai-Hoon
    International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (03): : 77 - 86