Machine Learning Security: Threat Model, Attacks, and Challenges

被引:2
作者
Koball, Carson [1 ]
Wang, Yong [2 ]
Rimal, Bhaskar P. [3 ]
Vaidyan, Varghese [4 ]
机构
[1] Dakota State Univ DSU, Comp Sci Program, Madison, WI 57042 USA
[2] Dakota State Univ, Madison, WI 57042 USA
[3] Univ Idaho, Dept Comp Sci, Moscow, ID 83844 USA
[4] Dakota State Univ, Beacom Coll Comp & Cyber Sci, Madison, SD 57042 USA
关键词
Threat modeling; Focusing; Machine learning; Computer security;
D O I
10.1109/MC.2024.3396357
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates machine learning (ML) security, focusing on threats and attacks against ML. We have created a threat model for ML to illustrate the threat actors involved. We present a new approach to classify threats and attacks targeting ML.
引用
收藏
页码:26 / 35
页数:10
相关论文
共 50 条
[21]   Detection of Security Attacks in Industrial IoT Networks: A Blockchain and Machine Learning Approach [J].
Vargas, Henry ;
Lozano-Garzon, Carlos ;
Montoya, German A. ;
Donoso, Yezid .
ELECTRONICS, 2021, 10 (21)
[22]   Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic [J].
Alzahrani, Rami J. ;
Alzahrani, Ahmed .
ELECTRONICS, 2021, 10 (23)
[23]   A Survey on Machine Learning Against Hardware Trojan Attacks: Recent Advances and Challenges [J].
Huang, Zhao ;
Wang, Quan ;
Chen, Yin ;
Jiang, Xiaohong .
IEEE ACCESS, 2020, 8 :10796-10826
[24]   A Review of Intrusion Detection Systems Using Machine Learning: Attacks, Algorithms and Challenges [J].
Luis Gutierrez-Garcia, Jose ;
Sanchez-DelaCruz, Eddy ;
del Pilar Pozos-Parra, Maria .
ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 :59-78
[25]   Political Security Threat Prediction Framework Using Hybrid Lexicon-Based Approach and Machine Learning Technique [J].
Razali, Noor Afiza Mat ;
Malizan, Nur Atiqah ;
Hasbullah, Nor Asiakin ;
Wook, Muslihah ;
Zainuddin, Norulzahrah Mohd ;
Ishak, Khairul Khalil ;
Ramli, Suzaimah ;
Sukardi, Sazali .
IEEE ACCESS, 2023, 11 :17151-17164
[26]   Detecting IoT Attacks Using an Ensemble Machine Learning Model [J].
Tomer, Vikas ;
Sharma, Sachin .
FUTURE INTERNET, 2022, 14 (04)
[27]   Incrementing Adversarial Robustness with Autoencoding for Machine Learning Model Attacks [J].
Sivaslioglu, Salved ;
Catak, Ferhat Ozgur ;
Gul, Ensar .
2019 27TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2019,
[28]   Machine learning enabled Industrial IoT Security: Challenges, Trends and Solutions [J].
Ni, Chunchun ;
Li, Shan Cang .
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2024, 38
[29]   A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers [J].
Harahsheh K. ;
Chen C.-H. .
Informatica (Slovenia), 2023, 47 (06) :1-54
[30]   When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges [J].
Wang, Qun ;
Sun, Haijian ;
Hu, Rose Qingyang ;
Bhuyan, Arupjyoti .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 :176-208