Poisoning attacks on machine learning models in cyber systems and mitigation strategies

被引:1
作者
Izmailov, Rauf [1 ]
Venkatesan, Sridhar [1 ]
Reddy, Achyut [1 ]
Chadha, Ritu [1 ]
De Lucia, Michael [2 ]
Oprea, Alina [3 ]
机构
[1] Peraton Labs Inc, Basking Ridge, NJ 07920 USA
[2] DEVCOM Army Res Lab, Aberdeen Proving Ground, MD USA
[3] Northeastern Univ, Boston, MA 02115 USA
来源
DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI | 2022年 / 12117卷
关键词
Machine learning; adversarial machine learning; network intrusion detection; data poisoning; data cleaning; classifier; poisoning attack;
D O I
10.1117/12.2622112
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Poisoning attacks on training data are becoming one of the top concerns among users of machine learning systems. The goal of such attacks is to inject a small set of maliciously mislabeled training data into the training pipeline so as to detrimentally impact a machine learning model trained on such data. Constructing such attacks for cyber applications is especially challenging due to their realizability constraints. Furthermore, poisoning mitigation techniques for such applications are also not well understood. This paper investigates techniques for realizable data poisoning availability attacks (using several cyber applications), in which an attacker can insert a set of poisoned samples at the training time with the goal of degrading the accuracy of the deployed model. We design a white-box, realizable poisoning attack that degraded the original model's accuracy by generating mislabeled samples in close vicinity of a selected subset of training points. We investigate this strategy and its modifications for key classifier architectures and provide specific implications for each of them. The paper also proposes a novel data cleaning method as a defense against such poisoning attacks. Our defense includes a diversified ensemble of classifiers, each trained on a different subset of the training set. We use the disagreement of the classifiers' predictions as a decision whether to keep a given sample in the training dataset or remove it. The results demonstrate the efficiency of this strategy with very limited performance penalty.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Effects of dataset attacks on machine learning models in e-health
    Moulahi, Tarek
    Khediri, Salim El
    Nayab, Durre
    Freihat, Mushira
    Khan, Rehan Ullah
    ANNALS OF TELECOMMUNICATIONS, 2023, 78 (11-12) : 655 - 665
  • [42] Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
    Goldblum, Micah
    Tsipras, Dimitris
    Xie, Chulin
    Chen, Xinyun
    Schwarzschild, Avi
    Song, Dawn
    Madry, Aleksander
    Li, Bo
    Goldstein, Tom
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (02) : 1563 - 1580
  • [43] Effects of dataset attacks on machine learning models in e-health
    Tarek Moulahi
    Salim El Khediri
    Durre Nayab
    Mushira Freihat
    Rehan Ullah Khan
    Annals of Telecommunications, 2023, 78 : 655 - 665
  • [44] Attack Is the Best Defense: A Multi-Mode Poisoning PUF Against Machine Learning Attacks
    Lin, Chia-Chih
    Chen, Ming-Syan
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2021, PT I, 2021, 12712 : 176 - 187
  • [45] The data recovery strategy on machine learning against false data injection attacks in power cyber physical systems
    Li, Qinxue
    Yang, Xiaofen
    Xie, Xuhuan
    Liu, Guiyun
    MEASUREMENT & CONTROL, 2024, : 632 - 642
  • [46] Detection and prevention of evasion attacks on machine learning models
    Muthalagu, Raja
    Malik, Jasmita
    Pawar, Pranav M.
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 266
  • [47] A Machine Learning Approach for Combating Cyber Attacks in Self-Driving Vehicles
    Berry, Hunter
    Abdel-Malek, Mai A.
    Ibrahim, Ahmed S.
    SOUTHEASTCON 2021, 2021, : 741 - 743
  • [48] A Lightweight Multilayer Machine Learning Detection System for Cyber-attacks in WSN
    Ismail, Shereen
    Dawoud, Diana
    Reza, Hassan
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 481 - 486
  • [49] Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey
    Miao, Yuantian
    Chen, Chao
    Pan, Lei
    Han, Qing-Long
    Zhang, Jun
    Xiang, Yang
    ACM COMPUTING SURVEYS, 2021, 54 (07)
  • [50] Multi-Source Cyber-Attacks Detection using Machine Learning
    Taheri, Sona
    Gondal, Iqbal
    Bagirov, Adil
    Harkness, Greg
    Brown, Simon
    Chi, CHihung
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1167 - 1172