Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey

被引:16
作者
Wang, Shunyao [1 ]
Ko, Ryan K. L. [1 ]
Bai, Guangdong [1 ]
Dong, Naipeng [1 ]
Choi, Taejun [1 ]
Zhang, Yanjun [2 ]
机构
[1] Univ Queensland, Sch Elect Engn & Comp Sci, Brisbane, Qld 4072, Australia
[2] Univ Technol Sydney, Sch Comp Sci, Sydney, NSW 2007, Australia
关键词
Surveys; Taxonomy; Data models; Tutorials; Training; Adaptation models; Systematics; Evasion attack; adversarial machine learning; Internet of Things; cyber physical systems; cybersecurity; deep learning; GENERATIVE ADVERSARIAL NETWORKS; IDENTIFICATION METHOD; NEURAL-NETWORK; TIME-SERIES; INTRUSION; CLASSIFICATION; PREDICTION; INDUSTRIAL; ROBUSTNESS; ALGORITHMS;
D O I
10.1109/COMST.2023.3344808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems (CPS) are increasingly relying on machine learning (ML) techniques to reduce labor costs and improve efficiency. However, the adoption of ML also exposes CPS to potential adversarial ML attacks witnessed in the literature. Specifically, the increased Internet connectivity in CPS has resulted in a surge in the volume of data generation and communication frequency among devices, thereby expanding the attack surface and attack opportunities for ML adversaries. Among various adversarial ML attacks, evasion attacks are one of the most well-known ones. Therefore, this survey focuses on summarizing the latest research on evasion attack and defense techniques, to understand state-of-the-art ML model security in CPS. To assess the attack effectiveness, this survey proposes an attack taxonomy by introducing quantitative measures such as perturbation level and the number of modified features. Similarly, a defense taxonomy is introduced based on four perspectives demonstrating the defensive techniques from models' inputs to their outputs. Furthermore, the survey identifies gaps and promising directions that researchers and practitioners can explore to address potential challenges and threats caused by evasion attacks and lays the groundwork for understanding and mitigating the attacks in CPS.
引用
收藏
页码:930 / 966
页数:37
相关论文
共 257 条
[51]   The Vulnerability of UAVs: An Adversarial Machine Learning Perspective [J].
Doyle, Michael ;
Harguess, Joshua ;
Manville, Keith ;
Rodriguez, Mikel .
GEOSPATIAL INFORMATICS XI, 2021, 11733
[52]   Polymorphic Malware Detection Using Sequence Classification Methods [J].
Drew, Jake ;
Moore, Tyler ;
Hahsler, Michael .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, :81-87
[53]   Collaborative Control Protocol for Agricultural Cyber-Physical System [J].
Dusadeerungsikul, Puwadol Oak ;
Nof, Shimon Y. ;
Bechar, Avital ;
Tao, Yang .
25TH INTERNATIONAL CONFERENCE ON PRODUCTION RESEARCH MANUFACTURING INNOVATION: CYBER PHYSICAL MANUFACTURING, 2019, 39 :235-242
[54]   A Neural Network Ensemble With Feature Engineering for Improved Credit Card Fraud Detection [J].
Esenogho, Ebenezer ;
Mienye, Ibomoiye Domor ;
Swart, Theo G. ;
Aruleba, Kehinde ;
Obaido, George .
IEEE ACCESS, 2022, 10 :16400-16407
[55]  
Estrela J., 2018, P 3 BRAZ TECHN S EME, P319
[56]   Emergency Response Cyber-Physical System for Disaster Prevention with Sustainable Electronics [J].
Estrela, Vania V. ;
Saotome, Osamu ;
Hemanth, Jude ;
Cabral, Rui J. R. .
10TH ACM INTERNATIONAL CONFERENCE ON PERVASIVE TECHNOLOGIES RELATED TO ASSISTIVE ENVIRONMENTS (PETRA 2017), 2017, :238-239
[57]   Smart Agriculture as a Cyber Physical System: A Real-World Deployment [J].
Et-taibi, Bouali ;
Abid, Mohamed Riduan ;
Boumhidi, Ismail ;
Benhaddou, Driss .
2020 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS), 2020,
[58]   Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning [J].
Fang, Haokun ;
Qian, Quan .
FUTURE INTERNET, 2021, 13 (04)
[59]  
Feinman R, 2017, Arxiv, DOI arXiv:1703.00410
[60]  
Feng C, 2017, Arxiv, DOI arXiv:1709.06397