Artificial Intelligence Security: Threats and Countermeasures

被引:45
|
作者
Hu, Yupeng [1 ]
Kuang, Wenxin [1 ]
Qin, Zheng [1 ]
Li, Kenli [1 ]
Zhang, Jiliang [1 ]
Gao, Yansong [2 ]
Li, Wenjia [3 ]
Li, Keqin [4 ]
机构
[1] Hunan Univ, Changsha 410082, Hunan, Peoples R China
[2] Nanjing Univ Sci & Technol, Nanjing 210094, Jiangsu, Peoples R China
[3] New York Inst Technol, New York, NY 10023 USA
[4] SUNY Albany, Albany, NY 12246 USA
基金
湖南省自然科学基金; 中国国家自然科学基金;
关键词
Adversarial example attack; artificial intelligence security; poisoning attack; image scaling attack; data collection related attack; AUTOMATIC SPEECH RECOGNITION; DATA-COLLECTION; NEURAL-NETWORK; ATTACKS; ROBUSTNESS;
D O I
10.1145/3487890
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, with rapid technological advancement in both computing hardware and algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human being in a wide range of fields, such as image recognition, education, autonomous vehicles, finance, and medical diagnosis. However, AI-based systems are generally vulnerable to various security threats throughout the whole process, ranging from the initial data collection and preparation to the training, inference, and final deployment. In an AI-based system, the data collection and pre-processing phase are vulnerable to sensor spoofing attacks and scaling attacks, respectively, while the training and inference phases of the model are subject to poisoning attacks and adversarial attacks, respectively. To address these severe security threats against the AI-based systems, in this article, we review the challenges and recent research advances for security issues in AI, so as to depict an overall blueprint for AI security. More specifically, we first take the lifecycle of an AI-based system as a guide to introduce the security threats that emerge at each stage, which is followed by a detailed summary for corresponding countermeasures. Finally, some of the future challenges and opportunities for the security issues in AI will also be discussed.
引用
收藏
页数:36
相关论文
共 50 条
  • [1] Artificial Intelligence Security: Threats and Countermeasures
    Hu, Yupeng
    Kuang, Wenxin
    Qin, Zheng
    Li, Kenli
    Zhang, Jiliang
    Gao, Yansong
    Li, Wenjia
    Li, Keqin
    ACM Computing Surveys, 2021, 55 (01)
  • [2] Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey
    Zaman, Shakila
    Alhazmi, Khaled
    Aseeri, Mohammed A.
    Ahmed, Muhammad Raisuddin
    Khan, Risala Tasin
    Kaiser, M. Shamim
    Mahmud, Mufti
    IEEE ACCESS, 2021, 9 : 94668 - 94690
  • [3] Security threats to agricultural artificial intelligence: Position and perspective
    Gao, Yansong
    Camtepe, Seyit A.
    Sultan, Nazatul Haque
    Bui, Hang Thanh
    Mahboubi, Arash
    Aboutorab, Hamed
    Bewong, Michael
    Islam, Rafiqul
    Islam, Md Zahidul
    Chauhan, Aufeef
    Gauravaram, Praveen
    Singh, Dineshkumar
    COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2024, 227
  • [4] Security threats and countermeasures in WLAN
    Nagamalai, D
    Dhinakaran, BC
    Sasikala, P
    Lee, SH
    Lee, JK
    TECHNOLOGIES FOR ADVANCED HETEROGENEOUS NETWORKS, PROCEEDINGS, 2005, 3837 : 168 - 182
  • [6] Artificial intelligence and global security: future trends, threats and considerations
    Chen, Kai
    INTERNATIONAL AFFAIRS, 2021, 97 (06) : 1998 - 1999
  • [7] Economic Security: New Threats and Countermeasures
    Tsiklauri, Viktoria
    Tkacheva, Elizabeth
    Piyaltsev, Alexander
    Ukrainceva, Irina
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 9528 - 9537
  • [8] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    INFORMATION AGE, 1989, 11 (04): : 205 - 210
  • [9] Intelligence in security countermeasures selection
    Tamjidi, Sina
    Shameli-Sendi, Alireza
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 137 - 148
  • [10] Intelligence in security countermeasures selection
    Sina Tamjidi
    Alireza Shameli-Sendi
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 137 - 148