Poisoning attacks on machine learning models in cyber systems and mitigation strategies

被引:1
作者
Izmailov, Rauf [1 ]
Venkatesan, Sridhar [1 ]
Reddy, Achyut [1 ]
Chadha, Ritu [1 ]
De Lucia, Michael [2 ]
Oprea, Alina [3 ]
机构
[1] Peraton Labs Inc, Basking Ridge, NJ 07920 USA
[2] DEVCOM Army Res Lab, Aberdeen Proving Ground, MD USA
[3] Northeastern Univ, Boston, MA 02115 USA
来源
DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI | 2022年 / 12117卷
关键词
Machine learning; adversarial machine learning; network intrusion detection; data poisoning; data cleaning; classifier; poisoning attack;
D O I
10.1117/12.2622112
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Poisoning attacks on training data are becoming one of the top concerns among users of machine learning systems. The goal of such attacks is to inject a small set of maliciously mislabeled training data into the training pipeline so as to detrimentally impact a machine learning model trained on such data. Constructing such attacks for cyber applications is especially challenging due to their realizability constraints. Furthermore, poisoning mitigation techniques for such applications are also not well understood. This paper investigates techniques for realizable data poisoning availability attacks (using several cyber applications), in which an attacker can insert a set of poisoned samples at the training time with the goal of degrading the accuracy of the deployed model. We design a white-box, realizable poisoning attack that degraded the original model's accuracy by generating mislabeled samples in close vicinity of a selected subset of training points. We investigate this strategy and its modifications for key classifier architectures and provide specific implications for each of them. The paper also proposes a novel data cleaning method as a defense against such poisoning attacks. Our defense includes a diversified ensemble of classifiers, each trained on a different subset of the training set. We use the disagreement of the classifiers' predictions as a decision whether to keep a given sample in the training dataset or remove it. The results demonstrate the efficiency of this strategy with very limited performance penalty.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Detecting Cyber Attacks with High-Frequency Features using Machine Learning Algorithms
    Ozalp, Ahmet Nusret
    Albayrak, Zafer
    ACTA POLYTECHNICA HUNGARICA, 2022, 19 (07) : 213 - 233
  • [32] DDoS Attacks Detection and Mitigation in SDN using Machine Learning
    Rahman, Obaid
    Quraishi, Mohammad Ali Gauhar
    Lung, Chung-Horng
    2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, : 184 - 189
  • [33] A Countermeasure Method Using Poisonous Data Against Poisoning Attacks on IoT Machine Learning
    Chiba, Tomoki
    Sei, Yuichi
    Tahara, Yasuyuki
    Ohsuga, Akihiko
    INTERNATIONAL JOURNAL OF SEMANTIC COMPUTING, 2021, 15 (02) : 215 - 240
  • [34] Network-Based Machine Learning Detection of Covert Channel Attacks on Cyber-Physical Systems
    Li, Hongwei
    Chasaki, Danai
    2022 IEEE 20TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2022, : 195 - 201
  • [35] Benchmarking Machine Learning based Detection of Cyber Attacks for Critical Infrastructure
    Kumar, Ajit
    Choi, Bong Jun
    36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, : 24 - 29
  • [36] Using Machine Learning for Detection and Classification of Cyber Attacks in Edge IoT
    Becker, Elena
    Gupta, Maanak
    Aryal, Kshitiz
    2023 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND COMMUNICATIONS, EDGE, 2023, : 400 - 410
  • [37] Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
    Rosenberg, Ishai
    Shabtai, Asaf
    Elovici, Yuval
    Rokach, Lior
    ACM COMPUTING SURVEYS, 2021, 54 (05)
  • [38] Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
    Wang, Shunyao
    Ko, Ryan K. L.
    Bai, Guangdong
    Dong, Naipeng
    Choi, Taejun
    Zhang, Yanjun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (02): : 930 - 966
  • [39] DETECTION AND PREVENTION OF CYBER DEFENSE ATTACKS USING MACHINE LEARNING ALGORITHMS
    Shang, Yongqiang
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 760 - 769
  • [40] Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation
    Puthal, Deepak
    Mohanty, Saraju P.
    Mishra, Amit Kumar
    Yeun, Chan Yeob
    Damiani, Ernesto
    2023 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2023, : 85 - 90