Disruptive attacks on artificial neural networks: A systematic review of attack techniques, detection methods, and protection strategies

被引:1
作者
Alobaid, Ahmad [1 ]
Bonny, Talal [2 ]
Alrahhal, Maher [1 ]
机构
[1] Univ Sharjah, Res Inst Sci & Engn, Sharjah, U Arab Emirates
[2] Univ Sharjah, Coll Comp & Informat, Dept Comp Engn, Sharjah, U Arab Emirates
来源
INTELLIGENT SYSTEMS WITH APPLICATIONS | 2025年 / 26卷
关键词
Fault injection attacks; Adversarial attacks; Deep neural network; Machine learning; Security analysis; MEMBERSHIP INFERENCE ATTACKS; ADVERSARIAL ATTACKS; BACKDOOR ATTACKS; POISONING ATTACKS; MODEL INVERSION; DEEP; DEFENSE; PRIVACY;
D O I
10.1016/j.iswa.2025.200529
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper provides a systematic review of disruptive attacks on artificial neural networks (ANNs). As neural networks become increasingly integral to critical applications, their vulnerability to various forms of attack poses significant security challenges. This review categorizes and analyzes recent advancements in attack techniques, detection methods, and protection strategies for ANNs. It explores various attacks, including adversarial attacks, data poisoning, fault injections, membership inference, model inversion, timing, and watermarking attacks, examining their methodologies, limitations, impacts, and potential improvements. Key findings reveal that while detection and protection mechanisms such as adversarial training, noise injection, and hardware-based defenses have advanced significantly, many existing solutions remain vulnerable to adaptive attack strategies and scalability challenges. Additionally, fault injection attacks at the hardware level pose an emerging threat with limited countermeasures. The review identifies critical gaps in defense strategies, particularly in balancing robustness, computational efficiency, and real-world applicability. Future research should focus on scalable defense solutions to ensure effective deployment across diverse ANN architectures and critical applications, such as autonomous systems. Furthermore, integrating emerging technologies, including generative AI models and hybrid architectures, should be prioritized to better understand and mitigate their vulnerabilities.
引用
收藏
页数:28
相关论文
共 213 条
[1]   A Neuron Noise-Injection Technique for Privacy Preserving Deep Neural Networks [J].
Adesuyi, Tosin A. ;
Kim, Byeong Man .
OPEN COMPUTER SCIENCE, 2020, 10 (01) :137-152
[2]   Enhancing the Security of Collaborative Deep Neural Networks: An Examination of the Effect of Low Pass Filters [J].
Adeyemo, Adewale A. ;
Hasan, Syed Rafay .
PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2023, GLSVLSI 2023, 2023, :461-465
[3]  
Aftab K., 2024, Chinese Clinical Oncology, V13, DOI [10.21037/cco-24-ab093.AB093-AB093Aug, DOI 10.21037/CCO-24-AB093.AB093-AB093AUG]
[4]   A Systematic Literature Review on Hardware Reliability Assessment Methods for Deep Neural Networks [J].
Ahmadilivani, Mohammad Hasan ;
Taheri, Mahdi ;
Raik, Jaan ;
Daneshtalab, Masoud ;
Jenihhin, Maksim .
ACM COMPUTING SURVEYS, 2024, 56 (06)
[5]   Artificial Neural Networks for Sustainable Development of the Construction Industry [J].
Ahmed, Mohd ;
AlQadhi, Saeed ;
Mallick, Javed ;
Ben Kahla, Nabil ;
Le, Hoang Anh ;
Singh, Chander Kumar ;
Hang, Hoang Thi .
SUSTAINABILITY, 2022, 14 (22)
[6]   Sparse Attacks for Manipulating Explanations in Deep Neural Network Models [J].
Ajalloeian, Ahmad ;
Moosavi-Dezfooli, Seyed Mohsen ;
Vlachos, Michalis ;
Frossard, Pascal .
23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING, ICDM 2023, 2023, :918-923
[7]   Forming Adversarial Example Attacks Against Deep Neural Networks With Reinforcement Learning [J].
Akers, Matthew ;
Barton, Armon .
COMPUTER, 2024, 57 (01) :88-99
[8]   A radial basis deep neural network process using the Bayesian regularization optimization for the monkeypox transmission model [J].
Akkilic, Ayse Nur ;
Sabir, Zulqurnain ;
Bhat, Shahid Ahmad ;
Bulut, Hasan .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 235
[9]  
AlFarah M., 2022, 2022 ADV SCI ENG TEC, P1, DOI [10.1109/ASET53988.2022.9735071, DOI 10.1109/ASET53988.2022.9735071]
[10]   Characterization of Timing-based Software Side-channel Attacks and Mitigations on Network-on-Chip Hardware [J].
Ali, Usman ;
Sahni, Sheikh Abdul Rasheed ;
Khan, Omer .
ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (03)