Machine Learning Security: Threats, Countermeasures, and Evaluations

被引:89
作者
Xue, Mingfu [1 ]
Yuan, Chengxiang [1 ]
Wu, Heyi [2 ]
Zhang, Yushu [1 ]
Liu, Weiqiang [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Nanjing Upsec Network Secur Technol Res Inst Co L, Nanjing 211100, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210016, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Machine learning; Security; Data models; Machine learning algorithms; Training; Training data; Prediction algorithms; Artificial intelligence security; poisoning attacks; backdoor attacks; adversarial examples; privacy-preserving machine learning; POISONING ATTACKS; DEFENSES;
D O I
10.1109/ACCESS.2020.2987435
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning has been pervasively used in a wide range of applications due to its technical breakthroughs in recent years. It has demonstrated significant success in dealing with various complex problems, and shows capabilities close to humans or even beyond humans. However, recent studies show that machine learning models are vulnerable to various attacks, which will compromise the security of the models themselves and the application systems. Moreover, such attacks are stealthy due to the unexplained nature of the deep learning models. In this survey, we systematically analyze the security issues of machine learning, focusing on existing attacks on machine learning systems, corresponding defenses or secure learning techniques, and security evaluation methods. Instead of focusing on one stage or one type of attack, this paper covers all the aspects of machine learning security from the training phase to the test phase. First, the machine learning model in the presence of adversaries is presented, and the reasons why machine learning can be attacked are analyzed. Then, the machine learning security-related issues are classified into five categories: training set poisoning; backdoors in the training set; adversarial example attacks; model theft; recovery of sensitive training data. The threat models, attack approaches, and defense techniques are analyzed systematically. To demonstrate that these threats are real concerns in the physical world, we also reviewed the attacks in real-world conditions. Several suggestions on security evaluations of machine learning systems are also provided. Last, future directions for machine learning security are also presented.
引用
收藏
页码:74720 / 74742
页数:23
相关论文
共 50 条
  • [21] A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures
    Swessi, Dorsaf
    Idoudi, Hanen
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (02) : 1557 - 1592
  • [22] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530
  • [23] Security Challenges for Drone Communications: Possible Threats, Attacks and Countermeasures
    Krichen, Moez
    Adoni, Wilfried Yves Hamilton
    Mihoub, Alaeddine
    Alzahrani, Mohammed Y.
    Nahhal, Tarik
    2022 2ND INTERNATIONAL CONFERENCE OF SMART SYSTEMS AND EMERGING TECHNOLOGIES (SMARTTECH 2022), 2022, : 184 - 189
  • [24] Security threats and countermeasures in military 5G systems
    Sliwa, Joanna
    Suchanski, Marek
    2022 24TH INTERNATIONAL MICROWAVE AND RADAR CONFERENCE (MIKON), 2022,
  • [25] A Survey on Internet-of-Things Security: Threats and Emerging Countermeasures
    Dorsaf Swessi
    Hanen Idoudi
    Wireless Personal Communications, 2022, 124 : 1557 - 1592
  • [26] An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design Tools
    Hu, Wei
    Chang, Chip-Hong
    Sengupta, Anirban
    Bhunia, Swarup
    Kastner, Ryan
    Li, Hai
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 40 (06) : 1010 - 1038
  • [27] A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
    Liu, Qiang
    Li, Pan
    Zhao, Wentao
    Cai, Wei
    Yu, Shui
    Leung, Victor C. M.
    IEEE ACCESS, 2018, 6 : 12103 - 12117
  • [28] A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats
    Alsalman, Dheyaaldin
    IEEE ACCESS, 2024, 12 : 14719 - 14730
  • [29] Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
    Olowononi, Felix O.
    Rawat, Danda B.
    Liu, Chunmei
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01): : 524 - 552
  • [30] Machine Learning for Cloud Security: A Systematic Review
    Nassif, Ali Bou
    Abu Talib, Manar
    Nasir, Qassim
    Albadani, Halah
    Dakalbab, Fatima Mohamad
    IEEE ACCESS, 2021, 9 : 20717 - 20735