Artificial Intelligence Security: Threats and Countermeasures

被引:45
|
作者
Hu, Yupeng [1 ]
Kuang, Wenxin [1 ]
Qin, Zheng [1 ]
Li, Kenli [1 ]
Zhang, Jiliang [1 ]
Gao, Yansong [2 ]
Li, Wenjia [3 ]
Li, Keqin [4 ]
机构
[1] Hunan Univ, Changsha 410082, Hunan, Peoples R China
[2] Nanjing Univ Sci & Technol, Nanjing 210094, Jiangsu, Peoples R China
[3] New York Inst Technol, New York, NY 10023 USA
[4] SUNY Albany, Albany, NY 12246 USA
基金
湖南省自然科学基金; 中国国家自然科学基金;
关键词
Adversarial example attack; artificial intelligence security; poisoning attack; image scaling attack; data collection related attack; AUTOMATIC SPEECH RECOGNITION; DATA-COLLECTION; NEURAL-NETWORK; ATTACKS; ROBUSTNESS;
D O I
10.1145/3487890
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, with rapid technological advancement in both computing hardware and algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human being in a wide range of fields, such as image recognition, education, autonomous vehicles, finance, and medical diagnosis. However, AI-based systems are generally vulnerable to various security threats throughout the whole process, ranging from the initial data collection and preparation to the training, inference, and final deployment. In an AI-based system, the data collection and pre-processing phase are vulnerable to sensor spoofing attacks and scaling attacks, respectively, while the training and inference phases of the model are subject to poisoning attacks and adversarial attacks, respectively. To address these severe security threats against the AI-based systems, in this article, we review the challenges and recent research advances for security issues in AI, so as to depict an overall blueprint for AI security. More specifically, we first take the lifecycle of an AI-based system as a guide to introduce the security threats that emerge at each stage, which is followed by a detailed summary for corresponding countermeasures. Finally, some of the future challenges and opportunities for the security issues in AI will also be discussed.
引用
收藏
页数:36
相关论文
共 50 条
  • [21] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6
  • [22] A systematic review of security threats and countermeasures in SaaS
    de Leon Guillen, Miguel Angel Diaz
    Morales-Rocha, Victor
    Fernandez Martinez, Luis Felipe
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (06) : 635 - 653
  • [23] Research on security threats and Countermeasures for Cloud Computing
    Mi, Qing
    Ni, Zhen-tao
    Wang, Xiao-duan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 322 - 327
  • [25] Artificial Vice? Artificial Intelligence and Threats to the Self
    Cruz, Eduardo R.
    THEOLOGY AND SCIENCE, 2025,
  • [26] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48
  • [27] Security in Software-Defined Networking: Threats and Countermeasures
    Shu, Zhaogang
    Wan, Jiafu
    Li, Di
    Lin, Jiaxiang
    Vasilakos, Athanasios V.
    Imran, Muhammad
    MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05): : 764 - 776
  • [28] Machine learning security and privacy: a review of threats and countermeasures
    Paracha, Anum
    Arshad, Junaid
    Farah, Mohamed Ben
    Ismail, Khalid
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01)
  • [29] A Survey: Security Threats and Countermeasures in Software Defined Networking
    Mubarakali, Azath
    Alqahtani, Abdulrahman Saad
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2019, : 180 - 185
  • [30] Security Threats and Countermeasures for Intra-Vehicle Networks
    Wampler, David
    Fu, Huirong
    Zhu, Ye
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 153 - +