EdDSA Shield: Fortifying Machine Learning Against Data Poisoning Threats in Continual Learning

被引:0
|
作者
Nageswari, Akula [1 ]
Sanjeevulu, Vasundra [2 ]
机构
[1] Jawaharlal Nehru Technol Univ Ananthapur, Ananthapuramu, India
[2] JNTUA Coll Engn, Ananthapuramu, India
来源
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023 | 2025年 / 1273卷
关键词
Continual learning; Machine learning; EdDSA; Data poisoning; Defense; CONCEPT DRIFT;
D O I
10.1007/978-981-97-8031-0_107
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Continual learning in machine learning systems requires models to adapt and evolve based on new data and experiences. However, this dynamic nature also introduces a vulnerability to data poisoning attacks, wheremaliciously crafted input can lead to misleading model updates. In this research, we propose a novel approach utilizing theEdDSAencryption system to safeguard the integrity of data streams in continual learning scenarios. By leveraging EdDSA, we establish a robust defense against data poisoning attempts, maintaining the model's trustworthiness and performance over time. Through extensive experimentation on diverse datasets and continual learning scenarios, we demonstrate the efficacy of our proposed approach. The results indicate a significant reduction in susceptibility to data poisoning attacks, even in the presence of sophisticated adversaries.
引用
收藏
页码:1018 / 1028
页数:11
相关论文
共 50 条
  • [11] Machine Unlearning by Reversing the Continual Learning
    Zhang, Yongjing
    Lu, Zhaobo
    Zhang, Feng
    Wang, Hao
    Li, Shaojing
    APPLIED SCIENCES-BASEL, 2023, 13 (16):
  • [12] Data Poisoning Attacks Against Federated Learning Systems
    Tolpegin, Vale
    Truex, Stacey
    Gursoy, Mehmet Emre
    Liu, Ling
    COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 480 - 501
  • [13] A Survey of Machine Learning Methods for DDoS Threats Detection Against SDN
    Chetouane, Ameni
    Karoui, Kamel
    DISTRIBUTED COMPUTING FOR EMERGING SMART NETWORKS, 2022, : 99 - 127
  • [14] Robustness Evaluations of Sustainable Machine Learning Models against Data Poisoning Attacks in the Internet of Things
    Dunn, Corey
    Moustafa, Nour
    Turnbull, Benjamin
    SUSTAINABILITY, 2020, 12 (16)
  • [15] Predicting and mitigating cyber threats through data mining and machine learning
    Samia, Nusrat
    Saha, Sajal
    Haque, Anwar
    COMPUTER COMMUNICATIONS, 2024, 228
  • [16] Protecting Data from Malware Threats using Machine Learning Technique
    Chowdhury, Mozammel
    Rahman, Azizur
    Islam, Rafiqul
    PROCEEDINGS OF THE 2017 12TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2017, : 1691 - 1694
  • [17] Defending Network IDS against Adversarial Examples with Continual Learning
    Kozal, Jedrzej
    Zwolinska, Justyna
    Klonowski, Marek
    Wozniak, Michal
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 60 - 69
  • [18] Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
    Goldblum, Micah
    Tsipras, Dimitris
    Xie, Chulin
    Chen, Xinyun
    Schwarzschild, Avi
    Song, Dawn
    Madry, Aleksander
    Li, Bo
    Goldstein, Tom
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (02) : 1563 - 1580
  • [19] A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
    Liu, Qiang
    Li, Pan
    Zhao, Wentao
    Cai, Wei
    Yu, Shui
    Leung, Victor C. M.
    IEEE ACCESS, 2018, 6 : 12103 - 12117
  • [20] Machine Learning Security: Threats, Countermeasures, and Evaluations
    Xue, Mingfu
    Yuan, Chengxiang
    Wu, Heyi
    Zhang, Yushu
    Liu, Weiqiang
    IEEE ACCESS, 2020, 8 : 74720 - 74742