Machine Learning Security: Threats, Countermeasures, and Evaluations

被引:89
|
作者
Xue, Mingfu [1 ]
Yuan, Chengxiang [1 ]
Wu, Heyi [2 ]
Zhang, Yushu [1 ]
Liu, Weiqiang [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Nanjing Upsec Network Secur Technol Res Inst Co L, Nanjing 211100, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210016, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Machine learning; Security; Data models; Machine learning algorithms; Training; Training data; Prediction algorithms; Artificial intelligence security; poisoning attacks; backdoor attacks; adversarial examples; privacy-preserving machine learning; POISONING ATTACKS; DEFENSES;
D O I
10.1109/ACCESS.2020.2987435
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing with various complex problems, and shows capabilities close to humans or even beyond humans. However, recent studies show that machine learning models are vulnerable to various attacks, which will compromise the security of the models themselves and the application systems. Moreover, such attacks are stealthy due to the unexplained nature of the deep learning models. In this survey, we systematically analyze the security issues of machine learning, focusing on existing attacks on machine learning systems, corresponding defenses or secure learning techniques, and security evaluation methods. Instead of focusing on one stage or one type of attack, this paper covers all the aspects of machine learning security from the training phase to the test phase. First, the machine learning model in the presence of adversaries is presented, and the reasons why machine learning can be attacked are analyzed. Then, the machine learning security-related issues are classified into five categories: training set poisoning; backdoors in the training set; adversarial example attacks; model theft; recovery of sensitive training data. The threat models, attack approaches, and defense techniques are analyzed systematically. To demonstrate that these threats are real concerns in the physical world, we also reviewed the attacks in real-world conditions. Several suggestions on security evaluations of machine learning systems are also provided. Last, future directions for machine learning security are also presented.
引用
收藏
页码:74720 / 74742
页数:23
相关论文
共 50 条
  • [41] A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis
    Rugo, Alessio
    Ardagna, Claudio A.
    Ioini, Nabil El
    ACM Computing Surveys, 2022, 55 (01):
  • [42] Security threats and countermeasures of MAC layer in cognitive radio networks
    Manesh, Mohsen Riahi
    Kaabouch, Naima
    AD HOC NETWORKS, 2018, 70 : 85 - 102
  • [43] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530
  • [44] Security Challenges for Drone Communications: Possible Threats, Attacks and Countermeasures
    Krichen, Moez
    Adoni, Wilfried Yves Hamilton
    Mihoub, Alaeddine
    Alzahrani, Mohammed Y.
    Nahhal, Tarik
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 184 - 189
  • [45] Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures
    Mawgoud, Ahmed A.
    Taha, Mohamed Hamed N.
    Khalifa, Nour Eldeen M.
    Loey, Mohamed
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2019, 2020, 1058 : 912 - 921
  • [46] Security threats and countermeasures in military 5G systems
    Sliwa, Joanna
    Suchanski, Marek
    2022 24TH INTERNATIONAL MICROWAVE AND RADAR CONFERENCE (MIKON), 2022,
  • [47] Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures
    Rajendran, Gowthamaraj
    Nivash, Ragul R. S.
    Parthy, Purushotham Parthiban
    Balamurugan, S.
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [48] A Survey on Security Threats and Countermeasures in Internet of Medical Things (IoMT)
    Papaioannou, Maria
    Karageorgou, Marina
    Mantas, Georgios
    Sucasas, Victor
    Essop, Ismael
    Rodriguez, Jonathan
    Lymberopoulos, Dimitrios
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06)
  • [49] Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures
    Duan, Li
    Sun, Yangyang
    Zhang, Kejia
    Ding, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [50] A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis
    Rugo, Alessio
    Ardagna, Claudio A.
    El Ioini, Nabil
    ACM COMPUTING SURVEYS, 2023, 55 (01)