Vulnerable AI: A Survey

被引:0
作者
Afolabi, Akindele Segun [1 ]
Akinola, Olubunmi Adewale [2 ]
机构
[1] Univ Ilorin, Fac Engn & Technol, Dept Elect & Elect Engn, Ilorin, Nigeria
[2] Fed Univ Agr, Coll Engn, Dept Elect & Elect Engn, Abeokuta, Nigeria
来源
2024 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY, ISTAS 2024 | 2024年
关键词
adversarial machine learning attack; network intrusion detection; artificial intelligence; cybersecurity; adversarial example; ADVERSARIAL NETWORK; ROBUSTNESS; ATTACKS;
D O I
10.1109/ISTAS61960.2024.10732647
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, artificial intelligence (AI) is finding relevance in diverse facets of human existence. For example, AI has been applied in areas such as finance, energy, healthcare, transportation, education, agriculture, and entertainment, just to mention a few. However, technologies that employ AI algorithms such as machine learning algorithms and deep learning algorithms are susceptible to a new challenge known as adversarial machine learning (AML) attacks. An AML attack occurs when a malicious actor crafts adversarial examples (AEs) to introduce perturbation into the original input data of an AI-based classification model to cause the model to misclassify inputs. This paper reviewed how computer vision systems, audio systems, industrial systems, transportation systems, blockchain technologies, and cybersecurity systems may be susceptible to AML attacks. Special attention is given to the discussion on AML attacks on network intrusion detection systems (NIDSs) while also highlighting adversarial defense strategies. The paper concludes with a proposal for future research direction regarding AML attack mitigation.
引用
收藏
页数:7
相关论文
共 30 条
  • [1] Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning
    Afolabi, Akindele S.
    Akinola, Olubunmi A.
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2024, 2024
  • [2] Investigating the Effect of Traffic Sampling on Machine Learning-Based Network Intrusion Detection Approaches
    Alikhanov, Jumabek
    Jang, Rhongho
    Abuhamad, Mohammed
    Mohaisen, David
    Nyang, Daehun
    Noh, Youngtae
    [J]. IEEE ACCESS, 2022, 10 : 5801 - 5823
  • [3] Statistical Detection of Adversarial Examples in Blockchain-Based Federated Forest In-Vehicle Network Intrusion Detection Systems
    Aliyu, Ibrahim
    Van Engelenburg, Selinde
    Mu'azu, Muhammed Bashir
    Kim, Jinsul
    Lim, Chang Gyoon
    [J]. IEEE ACCESS, 2022, 10 : 109366 - 109384
  • [4] Robust Network Intrusion Detection Through Explainable Artificial Intelligence (XAI)
    Barnard, Pieter
    Marchetti, Nicola
    Dasilva, Luiz A.
    [J]. IEEE Networking Letters, 2022, 4 (03): : 167 - 171
  • [5] Evidential classification for defending against adversarial attacks on network traffic
    Beechey, Matthew
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos G.
    [J]. INFORMATION FUSION, 2023, 92 : 115 - 126
  • [6] Cyberattacks Detection Through Behavior Analysis of Internet Traffic
    Berjawi, Omran
    El Attar, Ali
    Chbib, Fadlallah
    Khatoun, Rida
    Fahs, Walid
    [J]. 18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023, 2023, 224 : 52 - 59
  • [7] Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems
    Chen, Jiming
    Gao, Xiangshan
    Deng, Ruilong
    He, Yang
    Fang, Chongrong
    Cheng, Peng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1810 - 1825
  • [8] A black-box adversarial attack on demand side management
    Cramer, Eike
    Gao, Ji
    [J]. COMPUTERS & CHEMICAL ENGINEERING, 2024, 186
  • [9] Adversarial Examples for Malware Detection
    Grosse, Kathrin
    Papernot, Nicolas
    Manoharan, Praveen
    Backes, Michael
    McDaniel, Patrick
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 62 - 79
  • [10] Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors
    Han, Dongqi
    Wang, Zhiliang
    Zhong, Ying
    Chen, Wenqi
    Yang, Jiahai
    Lu, Shuqiang
    Shi, Xingang
    Yin, Xia
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (08) : 2632 - 2647