EdDSA Shield: Fortifying Machine Learning Against Data Poisoning Threats in Continual Learning

被引:0
|
作者
Nageswari, Akula [1 ]
Sanjeevulu, Vasundra [2 ]
机构
[1] Jawaharlal Nehru Technol Univ Ananthapur, Ananthapuramu, India
[2] JNTUA Coll Engn, Ananthapuramu, India
来源
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023 | 2025年 / 1273卷
关键词
Continual learning; Machine learning; EdDSA; Data poisoning; Defense; CONCEPT DRIFT;
D O I
10.1007/978-981-97-8031-0_107
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Continual learning in machine learning systems requires models to adapt and evolve based on new data and experiences. However, this dynamic nature also introduces a vulnerability to data poisoning attacks, wheremaliciously crafted input can lead to misleading model updates. In this research, we propose a novel approach utilizing theEdDSAencryption system to safeguard the integrity of data streams in continual learning scenarios. By leveraging EdDSA, we establish a robust defense against data poisoning attempts, maintaining the model's trustworthiness and performance over time. Through extensive experimentation on diverse datasets and continual learning scenarios, we demonstrate the efficacy of our proposed approach. The results indicate a significant reduction in susceptibility to data poisoning attacks, even in the presence of sophisticated adversaries.
引用
收藏
页码:1018 / 1028
页数:11
相关论文
共 50 条
  • [31] Chronic Poisoning Against Machine Learning Based IDSs Using Edge Pattern Detection
    Li, Pan
    Liu, Qiang
    Zhao, Wentao
    Wang, Dongxu
    Wang, Siqi
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [32] The robustness of popular multiclass machine learning models against poisoning attacks: Lessons and insights
    Maabreh, Majdi
    Maabreh, Arwa
    Qolomany, Basheer
    Al-Fuqaha, Ala
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (07)
  • [33] Data Learning: Integrating Data Assimilation and Machine Learning
    Buizza, Caterina
    Casas, Cesar Quilodran
    Nadler, Philip
    Mack, Julian
    Marrone, Stefano
    Titus, Zainab
    Le Cornec, Clemence
    Heylen, Evelyn
    Dur, Tolga
    Ruiz, Luis Baca
    Heaney, Claire
    Lopez, Julio Amador Diaz
    Kumar, K. S. Sesh
    Arcucci, Rossella
    JOURNAL OF COMPUTATIONAL SCIENCE, 2022, 58
  • [34] Continual Learning for Human-Machine Collaboration in VUCA Environments
    Fan, Yuchen
    Antonelli, Dario
    Simeone, Alessandro
    NAVIGATING UNPREDICTABILITY: COLLABORATIVE NETWORKS IN NON-LINEAR WORLDS, PRO-VE 2024, PT I, 2024, 726 : 68 - 81
  • [35] ML-SPAs: Fortifying Healthcare Cybersecurity Leveraging Varied Machine Learning Approaches against Spear Phishing Attacks
    Alanazi, Saad Awadh
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (03): : 4049 - 4080
  • [36] Fortifying Machine Learning-Powered Intrusion Detection: A Defense Strategy Against Adversarial Black-Box Attacks
    Pujari, Medha
    Sun, Weiqing
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 5, ICICT 2024, 2024, 1000 : 655 - 671
  • [37] CCF Based System Framework In Federated Learning Against Data Poisoning Attacks
    Ahmed, Ibrahim M.
    Kashmoola, Manar Younis
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2023, 26 (07): : 973 - 981
  • [38] Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services
    Omara, Ahmed
    Kantarci, Burak
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1844 - 1849
  • [39] Data Composition for Continual Learning in Application of Cyberattack Detection
    Lian, Jiayi
    Liu, Xueying
    Choi, Kevin
    Veeramani, Balaji
    Murli, Sathvik
    Hu, Alison
    Freeman, Laura
    Bowen, Edward
    Deng, Xinwei
    SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2024, PT IV, 2025, 15214 : 137 - 153
  • [40] Information Bottleneck Based Data Correction in Continual Learning
    Chen, Shuai
    Zhang, Mingyi
    Zhang, Junge
    Huang, Kaiqi
    COMPUTER VISION - ECCV 2024, PT LXXXVII, 2025, 15145 : 265 - 281