Evaluating the Effectiveness of Attacks and Defenses on Machine Learning Through Adversarial Samples

被引:2
|
作者
Gala, Viraj R. [1 ]
Schneider, Martin A. [1 ]
机构
[1] Fraunhofer FOKUS, Business Unit Qual Engn, Berlin, Germany
来源
2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS, ICSTW | 2023年
关键词
adversarial machine learning; adversarial attacks; CW attack; adversarial defense; KDE defense; adaptive CW attack; artificial intelligence; testing;
D O I
10.1109/ICSTW58534.2023.00027
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Adversarial attacks can compromise the robustness of machine learning models, including neural networks. Adversarial defenses can be employed to mitigate the impact of adversarial attacks. Due to adaptive attacks, however, the adversarial defenses are vulnerable as well. This makes it onerous to employ neural networks in safety and security-critical areas. However, a perception of the effectiveness of adversarial attacks and defenses can facilitate the development of more robust neural networks that are suitable for applications in these areas. The purpose of this paper is to evaluate the effectiveness of adversarial attacks and defenses and determine the dependency of effectiveness on the chosen values of the underlying parameters. To that end, we evaluate the (adaptive) Carlini & Wagner attack and KDE defense to measure their effectiveness for a range of parameter values. This paper investigates the aforementioned attacks and defenses for the optimal values of the parameters. We also prove that by changing the value of parameters, the effectiveness of adversarial attacks and defenses can be improved and state the necessary trade-offs involved. Furthermore, to substantiate the effect of adversarial attacks and defenses on the effectiveness of adaptive attacks, this paper investigates the effectiveness of the adaptive CW attack for the corresponding optimal values of the CW attack and KDE defense parameters.
引用
收藏
页码:90 / 97
页数:8
相关论文
共 50 条
  • [1] Adversarial Attacks and Defenses in Deep Learning
    Ren, Kui
    Zheng, Tianhang
    Qin, Zhan
    Liu, Xue
    ENGINEERING, 2020, 6 (03) : 346 - 360
  • [2] A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning
    Sadeghi, Koosha
    Banerjee, Ayan
    Gupta, Sandeep K. S.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2020, 4 (04): : 450 - 467
  • [3] Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
    Chen, Sen
    Xue, Minhui
    Fan, Lingling
    Hao, Shuang
    Xu, Lihua
    Zhu, Haojin
    Li, Bo
    COMPUTERS & SECURITY, 2018, 73 : 326 - 344
  • [4] A Survey on Adversarial Attacks and Defenses for Deep Reinforcement Learning
    Liu A.-S.
    Guo J.
    Li S.-M.
    Xiao Y.-S.
    Liu X.-L.
    Tao D.-C.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (08): : 1553 - 1576
  • [5] Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey
    Wang, Yulong
    Sun, Tong
    Li, Shenghong
    Yuan, Xin
    Ni, Wei
    Hossain, Ekram
    Vincent Poor, H.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (04): : 2245 - 2298
  • [6] A Systematic Review of Adversarial Machine Learning Attacks, Defensive Controls, and Technologies
    Malik, Jasmita
    Muthalagu, Raja
    Pawar, Pranav M.
    IEEE ACCESS, 2024, 12 : 99382 - 99421
  • [7] Adversarial attacks and defenses in deep learning for image recognition: A survey
    Wang, Jia
    Wang, Chengyu
    Lin, Qiuzhen
    Luo, Chengwen
    Wu, Chao
    Li, Jianqiang
    NEUROCOMPUTING, 2022, 514 : 162 - 181
  • [8] Effectiveness of machine learning based android malware detectors against adversarial attacks
    Jyothish, A.
    Mathew, Ashik
    Vinod, P.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2549 - 2569
  • [9] How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
    Costa, Joana C.
    Roxo, Tiago
    Proenca, Hugo
    Inacio, Pedro Ricardo Morais
    IEEE ACCESS, 2024, 12 : 61113 - 61136
  • [10] Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    Kardan, Navid
    Shah, Mubarak
    IEEE ACCESS, 2021, 9 : 155161 - 155196